Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

TM RedHotCyber 970x120 042543
Precedente Successivo

Latest news

Net-NTLMv1 Exploitation: Rainbow Tables for Modern Attacks Cyber News

Net-NTLMv1 Exploitation: Rainbow Tables for Modern Attacks

Mandiant has released a large set of rainbow tables dedicated to Net-NTLMv1 with the aim of concretely demonstrating how insecure...
Redazione RHC - January 18, 2026
Critical Vulnerability in Modular DS WordPress Plugin – Update Now Cyber News

Critical Vulnerability in Modular DS WordPress Plugin – Update Now

A high-severity security vulnerability has been identified in the WordPress plugin "Modular DS (Modular Connector)," and numerous security reports suggest...
Manuel Roccon - January 18, 2026
Your paycheck is zero! Congratulations, someone answered the phone wrong Cyber News

Your paycheck is zero! Congratulations, someone answered the phone wrong

No worker would accept their paycheck disappearing without explanation. It was precisely from a series of internal reports of this...
Redazione RHC - January 18, 2026
From Zero-Day Exploits to Hidden Tunnels: How UAT-8837 Operates Cyber News

From Zero-Day Exploits to Hidden Tunnels: How UAT-8837 Operates

Since early 2025, Cisco Talos specialists have detected the activity of the UAT-8837 group, which they attribute to China based...
Agostino Pellegrino - January 17, 2026
Gootloader Malware Returns with Enhanced Evasion Techniques Cybercrime

Gootloader Malware Returns with Enhanced Evasion Techniques

After a long period of silence, the Gootloader downloader malware has returned to the forefront. Last November, the Huntress team...
Massimiliano Brolli - January 17, 2026
US Considers Ramping Up Cyber Offensive Ops to Counter China Threats Cyber News

US Considers Ramping Up Cyber Offensive Ops to Counter China Threats

U.S. authorities are actively discussing the need to strengthen offensive cyber activities in the face of ongoing attacks on the...
Agostino Pellegrino - January 17, 2026

Critical RCE Vulnerability in D-Link DSL Routers – Update Now

A critical remote code execution (RCE) flaw in older D-Link DSL routers has been identified as CVE-2026-0625, with a CVSS v4.0 score of 9.3, indicating a high risk for users...

Critical n8n Vulnerability: Update Now to Prevent RCE Attacks

n8n, the “fair-code” workflow automation platform beloved by engineering teams for its combination of low-code speed and programming flexibility, has issued a critical security advisory. Few details are available on...

LED Data Transmission System for Smart Traffic

Researchers at Tokyo Polytechnic University have presented a simple and cost-effective wireless data transmission system using LEDs. The project boasts stable outdoor operation, even in bright sunlight, and could form...

Microsoft Shifts to Rust: AI-Driven Code Transformation by 2030

Microsoft has launched one of the most ambitious code transformation programs ever announced in the software industry: the stated goal is to completely remove C and C++ from its core...

Microsoft’s AI Future: Models to Systems with Satya Nadella

With 2026 just around the corner, Microsoft CEO Satya Nadella shared a thoughtful reflection on the state of the AI industry on SN Scratchpad , his new personal blog. In...

Patchwork Group Unleashes StreamSpy Malware with WebSocket C2 Channel

The Patchwork hacker group, also known as Dropping Elephant and Maha Grass , has returned to the spotlight after a series of targeted attacks on Pakistani defense facilities. In their...

WhatsApp Device Fingerprinting: New Measures Against Privacy Threats

WhatsApp, Meta's messaging app with over 3 billion monthly active users, has begun introducing technical changes to mitigate several privacy vulnerabilities on user devices . The fixes, identified through independent...

PS5 BootROM Key Leaked, Sony’s Security Compromised

A recent incident saw an anonymous hacker leak a crucial security key used by Sony to safeguard the integrity of the chain of trust in the PlayStation 5 console. This...

China Achieves Quantum Error Correction Breakthrough with Microchip

For years, quantum computers have seemed like a futuristic technology: on paper, they can solve problems that classical machines can’t handle in a reasonable time, but in reality they constantly...

Critical GNU Wget2 Vulnerability Exposes Users to File Overwrite Attacks

A serious vulnerability has been discovered in the popular GNU command-line downloader Wget2 , which allows attackers to overwrite files on the victim's computer without their knowledge or consent. The...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE