Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Banner Mobile
Cyber Offensive Fundamentals 970x120 V0.1

Red Hot Cyber. The Cybersecurity Blog

Precedente Successivo

Ultime news

Progress Software Patches LoadMaster, MOVEit WAF Vulnerabilities Vulnerability

Progress Software Patches LoadMaster, MOVEit WAF Vulnerabilities

On January 12, 2026, Progress Software Corporation released patches that address two high-severity Command Injection vulnerabilities, which could allow remote...
Agostino Pellegrino - 15 January 2026
Fortinet FortiSIEM Vulnerability CVE-2025-64155: Critical Security Update Cyber News

Fortinet FortiSIEM Vulnerability CVE-2025-64155: Critical Security Update

A critical security flaw was recently patched by Fortinet through update releases, which significantly impacted FortiSIEM . An unauthenticated attacker...
Redazione RHC - 15 January 2026
ARM: The Future of Low-Power Computing and AI Cyber News

ARM: The Future of Low-Power Computing and AI

Just look around and you'll almost certainly find a device nearby that uses a processor based on the same design:...
Redazione RHC - 15 January 2026
24-Year-Old Hacker Breaches US Supreme Court Database Cyber News

24-Year-Old Hacker Breaches US Supreme Court Database

Do you remember the 24-year-old hacker Carmelo Miano and the breaches of the Naples Prosecutor's Office's accounts and computer systems?...
Redazione RHC - 14 January 2026
Cyberattack Hits Belgian Hospital AZ Monica, Ransomware Used Cyber News

Cyberattack Hits Belgian Hospital AZ Monica, Ransomware Used

In the early morning hours of January 13, one of Belgium's leading hospitals suddenly found itself nearly paralyzed. AZ Monica,...
Redazione RHC - 14 January 2026
Meta Shifts Focus from Metaverse to AI-Powered Wearables Cyber News

Meta Shifts Focus from Metaverse to AI-Powered Wearables

Meta is launching a new internal reorganization process that directly involves Reality Labs, its virtual reality division, and the Metaverse....
Redazione RHC - 14 January 2026

LED Data Transmission System for Smart Traffic

Researchers at Tokyo Polytechnic University have presented a simple and cost-effective wireless data transmission system using LEDs. The project boasts stable outdoor operation, even in bright sunlight, and could form...

Microsoft Shifts to Rust: AI-Driven Code Transformation by 2030

Microsoft has launched one of the most ambitious code transformation programs ever announced in the software industry: the stated goal is to completely remove C and C++ from its core...

Microsoft’s AI Future: Models to Systems with Satya Nadella

With 2026 just around the corner, Microsoft CEO Satya Nadella shared a thoughtful reflection on the state of the AI industry on SN Scratchpad , his new personal blog. In...

Rare Earth Elements: US-China Competition Heats Up

An increasingly pressing question is emerging in the United States: after a long series of bans, restrictions, and closures against China, how will the country guarantee the supply of batteries...

Patchwork Group Unleashes StreamSpy Malware with WebSocket C2 Channel

The Patchwork hacker group, also known as Dropping Elephant and Maha Grass , has returned to the spotlight after a series of targeted attacks on Pakistani defense facilities. In their...

WhatsApp Device Fingerprinting: New Measures Against Privacy Threats

WhatsApp, Meta's messaging app with over 3 billion monthly active users, has begun introducing technical changes to mitigate several privacy vulnerabilities on user devices . The fixes, identified through independent...

Microsoft Removes Phone Activation for Windows and Office

Microsoft has finally removed the option to activate Windows and Office over the phone . While the company still includes this method in its support materials, it no longer works...

PS5 BootROM Key Leaked, Sony’s Security Compromised

A recent incident saw an anonymous hacker leak a crucial security key used by Sony to safeguard the integrity of the chain of trust in the PlayStation 5 console. This...

China Achieves Quantum Error Correction Breakthrough with Microchip

For years, quantum computers have seemed like a futuristic technology: on paper, they can solve problems that classical machines can’t handle in a reasonable time, but in reality they constantly...

Critical GNU Wget2 Vulnerability Exposes Users to File Overwrite Attacks

A serious vulnerability has been discovered in the popular GNU command-line downloader Wget2 , which allows attackers to overwrite files on the victim's computer without their knowledge or consent. The...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
A blow to the heart of cybercrime: RAMP taken offline. The “temple” of ransomware falls!
Bajram Zeqiri - 28/01/2026

The RAMP (Russian Anonymous Marketplace) forum, one of the main hubs of the international cybercrime underground, has been officially shut down and seized by US law enforcement . The news emerged after the domain associated…

Immagine del sitoCyberpolitics
Digital Autonomy: France Says Goodbye to Teams and Zoom by 2027
Silvia Felici - 28/01/2026

This isn’t the first initiative to emerge on this front recently. Indeed, we’ve heard several of them, one after the other. And it’s almost inevitable: technological autonomy and national security are becoming an increasingly popular…

Immagine del sitoCyber News
And let the phishing begin! Microsoft is taking action against a zero-day exploit already exploited in Office
Pietro Melillo - 27/01/2026

Once again, Microsoft was forced to quickly fix some flaws. The company has released unscheduled patches for Microsoft Office, addressing a dangerous zero-day vulnerability that has already been exploited in cyberattacks. The issue, identified as…

Immagine del sitoCyber News
ServiceNow Under Attack: How an Email Can Open the Doors to Your Business
Redazione RHC - 27/01/2026

The recent discovery of a vulnerability in ServiceNow’s AI platform has shaken the cybersecurity industry. This flaw, characterized by an extremely high severity score, allowed unauthenticated attackers to impersonate any corporate user. To launch the…

Immagine del sitoCybercrime
149 Million Accounts Exposed: The Database No One Should Have Seen
Redazione RHC - 26/01/2026

A recent leak revealed 149 million logins and passwords exposed online , including accounts for financial services, social media, gaming, and dating sites. The discovery was made by researcher Jeremiah Fowler and shared with ExpressVPN.…