Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

970x120 Olympous
Precedente Successivo

Latest news

Google Fast Pair Vulnerability: WhisperPair Exposes Millions of Devices Cyber News

Google Fast Pair Vulnerability: WhisperPair Exposes Millions of Devices

Researchers from the Cybersecurity and Industrial Cryptography team at KU Leuven have discovered a critical flaw in the Google Fast...
Agostino Pellegrino - January 19, 2026
Elon Musk Sues OpenAI for $134 Billion Over AI Betrayal Cyber News

Elon Musk Sues OpenAI for $134 Billion Over AI Betrayal

Elon Musk has filed a staggering $134 billion in damages in a malicious lawsuit against OpenAI and Microsoft. According to...
Redazione RHC - January 19, 2026
Net-NTLMv1 Exploitation: Rainbow Tables for Modern Attacks Cyber News

Net-NTLMv1 Exploitation: Rainbow Tables for Modern Attacks

Mandiant has released a large set of rainbow tables dedicated to Net-NTLMv1 with the aim of concretely demonstrating how insecure...
Redazione RHC - January 18, 2026
Critical Vulnerability in Modular DS WordPress Plugin – Update Now Cyber News

Critical Vulnerability in Modular DS WordPress Plugin – Update Now

A high-severity security vulnerability has been identified in the WordPress plugin "Modular DS (Modular Connector)," and numerous security reports suggest...
Manuel Roccon - January 18, 2026
Your paycheck is zero! Congratulations, someone answered the phone wrong Cyber News

Your paycheck is zero! Congratulations, someone answered the phone wrong

No worker would accept their paycheck disappearing without explanation. It was precisely from a series of internal reports of this...
Redazione RHC - January 18, 2026
Two Ukrainians Suspected in Black Basta Ransomware Attacks Cybercrime

Two Ukrainians Suspected in Black Basta Ransomware Attacks

When it comes to cybersecurity, it's not uncommon to come across news stories that seem straight out of a science...
Pietro Melillo - January 17, 2026

Undertow Vulnerability CVE-2025-12543 Exposes Java Ecosystem to Critical Security Risks

A flaw has been discovered in the foundation of the Java web ecosystem. Undertow , the high-performance web server that powers enterprise heavyweights like WildFly and JBoss EAP , has...

The Revolutionary iPhone Launch: A Game-Changing Moment in Tech History

San Francisco: January 9, 2007 There was something strange about the air, like when you know something's about to happen but you don't know what. Steve Jobs was on stage...

Cloudflare Hit with €14M Fine for Failing to Block Pirate Content

The Italian Communications Regulatory Authority (AGCOM) has imposed an administrative fine exceeding €14 million on Cloudflare Inc. for failure to comply with Italian legislation against online piracy. The measure was...

Iran Protests Escalate as Reza Pahlavi Calls for Action Against Government

Iranian protesters chanted and marched through the streets until Friday morning, following a call from exiled former Prince Reza Pahlavi to demonstrate, despite the Iranian theocracy cutting off the country...

Taiwan Citizens Accused in China of Smuggling and Cable Sabotage

Chinese authorities have formally charged two Taiwanese citizens with involvement in a smuggling operation linked to an incident in February that damaged an undersea cable and fueled renewed tensions between...

QR Code Phishing via HTML: New Attack Vector Emerges

We know that criminal hackers always manage to surprise us, and this time too they surprise us with the innovation and ways they invent to overcome obstacles, such as anti-spam...

Veeam Backup Vulnerability: Critical RCE Flaw Discovered – Update Now

Backups are generally considered the last line of defense, but this week Veeam reminded us that backup systems themselves can become entry points for attacks. The company released security updates...

GoBruteforcer Botnet Exploits AI-Generated Server Configs, Targets Crypto

The GoBruteforcer botnet has been discovered to be exploiting a surprisingly current weakness: the widespread reuse of AI-generated server configurations. This increasingly widespread practice is effectively leaving tens of thousands...

When Attack Discovery Becomes Automated, Detection Stops Scaling

For much of the past two decades, cybersecurity has been built on a simple assumption: malicious activity can be detected, analysed, and responded to before meaningful damage occurs. This assumption...

VMware ESXi VM Escape Exploit: Advanced Threats Revealed

A new report published by the Huntress Tactical Response Team documents a highly sophisticated intrusion detected in December 2025 , in which an advanced actor managed to compromise a VMware...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE