Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Fortinet 320x100px
970x120 Olympous

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Malware PHALT#BLYX Uses Social Engineering and MSBuild to Infect Systems Cybercrime

Malware PHALT#BLYX Uses Social Engineering and MSBuild to Infect Systems

A cancellation message from Booking.com with a high penalty seems like a typical business practice for hotels and apartments. But...
Redazione RHC - 7 January 2026
Disable Windows 11 AI Features Easily with RemoveWindowsAI Tool Cybercrime

Disable Windows 11 AI Features Easily with RemoveWindowsAI Tool

A new open-source script allows Windows 11 users to widely disable the operating system's built-in artificial intelligence features . The...
Redazione RHC - 7 January 2026
DevSecOps: Integrating Security into Your Development Process Cybercrime

DevSecOps: Integrating Security into Your Development Process

When it comes to application security, there's rarely a single problem. It's almost always a chain of small flaws, poor...
Massimiliano Brolli - 7 January 2026
Critical RCE Vulnerability in D-Link DSL Routers – Update Now Cybercrime

Critical RCE Vulnerability in D-Link DSL Routers – Update Now

A critical remote code execution (RCE) flaw in older D-Link DSL routers has been identified as CVE-2026-0625, with a CVSS...
Redazione RHC - 7 January 2026
Critical n8n Vulnerability: Update Now to Prevent RCE Attacks Vulnerability

Critical n8n Vulnerability: Update Now to Prevent RCE Attacks

n8n, the “fair-code” workflow automation platform beloved by engineering teams for its combination of low-code speed and programming flexibility, has...
Redazione RHC - 7 January 2026
Ledger Data Breach: Global-e Hack Exposes Customer Info Cybercrime

Ledger Data Breach: Global-e Hack Exposes Customer Info

Hackers have infiltrated Global-e's systems, and some Ledger customers are now at risk of receiving highly convincing scam emails. Ledger...
Redazione RHC - 7 January 2026

OpenAI Hiring Chief Security Officer to Mitigate AI Risks

OpenAI, the developer of ChatGPT, has announced the search for a new Chief Security Officer . The position, with an annual salary of $555,000, will be directly responsible for mitigating...
Share on Facebook Share on LinkedIn Share on X

Petlibro Vulnerabilities Exposed: Control Your Pet’s Safety Now

A series of vulnerabilities have been discovered in the popular Petlibro pet food vending ecosystem. In the worst-case scenario, these vulnerabilities allowed an attacker to log into someone else's account,...
Share on Facebook Share on LinkedIn Share on X

MongoBleed Vulnerability Exploited: Update MongoDB Now to Prevent Data Breach

The Cybersecurity and Infrastructure Security Agency (CISA) has officially raised the alarm about a critical vulnerability in MongoDB, adding the flaw to its catalog of known exploited vulnerabilities (KEVs). This...
Share on Facebook Share on LinkedIn Share on X

Apple Supply Chain Hit by Cyberattack: Sensitive Data at Risk

During the first half of December, a Chinese company assembling devices for Apple was hit by an advanced cyberattack that may have exposed sensitive information related to a production line....
Share on Facebook Share on LinkedIn Share on X

Browser-in-the-Browser Phishing Attack: How to Protect Yourself

This article analyzes a recent and sophisticated phishing campaign that uses the Browser-in-the-Browser (BitB) technique to steal credentials, particularly those from services like Microsoft 365. The BitB attack is notable...
Share on Facebook Share on LinkedIn Share on X

Critical WebKit Vulnerability Exposes iOS Devices to Code Execution

A new report details a critical vulnerability discovered by security researcher Joseph Goydish in Apple's WebKit engine. This security flaw, if exploited in conjunction with other exploits, could allow attackers...
Share on Facebook Share on LinkedIn Share on X

Xspeeder Devices Hit by AI-Discovered Zero-Day Vulnerability CVE-2025-54322

When it comes to cybersecurity, it's easy to fall into the trap of thinking that problems are always far away, that they only affect others. But the reality is that...
Share on Facebook Share on LinkedIn Share on X

TurboDiffusion: AI Video Generation Accelerated Up to 200 Times

Automatic video generation using artificial intelligence took a significant leap on December 25, 2025, when Tsinghua University announced the open source release of TurboDiffusion. The framework, developed by the TSAIL...
Share on Facebook Share on LinkedIn Share on X

OpenAI to Introduce ChatGPT Ads, Revolutionizing AI-Powered Marketing

OpenAI is once again discussing the possibility of introducing advertising into ChatGPT , this time in the form of so-called sponsored content. These aren't traditional banners, but content that could...
Share on Facebook Share on LinkedIn Share on X

Job Scams on Social Media: How to Avoid Fake Remote Job Offers

Fraudulent job ads promising easy money and remote work continue to flood social media, particularly in the Middle East and North Africa . Under the guise of part-time jobs that...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
ESXi Zero-Day Exploit: How to Protect Your VMware Environment
Redazione RHC - 20/01/2026

A group of attackers is using a zero-day exploit toolkit to compromise VMware ESXi instances in an uncontrolled manner, taking advantage of multiple vulnerabilities to bypass virtual machine restrictions. The current incident highlights the ongoing…

Immagine del sitoCybercrime
Google Fast Pair Vulnerability: WhisperPair Exposes Millions of Devices
Redazione RHC - 19/01/2026

Researchers from the Cybersecurity and Industrial Cryptography team at KU Leuven have discovered a critical flaw in the Google Fast Pair protocol. The vulnerability allows attackers to hijack control of millions of Bluetooth devices, track…

Immagine del sitoCybercrime
Elon Musk Sues OpenAI for $134 Billion Over AI Betrayal
Redazione RHC - 19/01/2026

Elon Musk has filed a staggering $134 billion in damages in a malicious lawsuit against OpenAI and Microsoft. According to Bloomberg , the latest lawsuit accuses OpenAI of betraying its core mission as a nonprofit…

Immagine del sitoCulture
Net-NTLMv1 Exploitation: Rainbow Tables for Modern Attacks
Redazione RHC - 18/01/2026

Mandiant has released a large set of rainbow tables dedicated to Net-NTLMv1 with the aim of concretely demonstrating how insecure this authentication protocol has become. Although Net-NTLMv1 has been deprecated for years and its weaknesses…

Immagine del sitoCybercrime
Your paycheck is zero! Congratulations, someone answered the phone wrong
Redazione RHC - 18/01/2026

No worker would accept their paycheck disappearing without explanation. It was precisely from a series of internal reports of this nature that an organization began investigating an apparently administrative anomaly, discovering instead a targeted cyber…