Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

TM RedHotCyber 970x120 042543
Precedente Successivo

Latest news

ARM: The Future of Low-Power Computing and AI Cyber News

ARM: The Future of Low-Power Computing and AI

Just look around and you'll almost certainly find a device nearby that uses a processor based on the same design:...
Redazione RHC - January 15, 2026
Meta Shifts Focus from Metaverse to AI-Powered Wearables Cyber News

Meta Shifts Focus from Metaverse to AI-Powered Wearables

Meta is launching a new internal reorganization process that directly involves Reality Labs, its virtual reality division, and the Metaverse....
Redazione RHC - January 14, 2026
China Leads the Way with Level 3 Autonomous Vehicle License Plates Cyber News

China Leads the Way with Level 3 Autonomous Vehicle License Plates

On December 23, the Traffic Management Bureau of the Beijing Municipal Public Security Bureau officially issued the first batch of...
Redazione RHC - January 14, 2026
Cloudflare vs Italy: The Battle for Internet Freedom and DNS Control Cyber News

Cloudflare vs Italy: The Battle for Internet Freedom and DNS Control

Cloudflare CEO Matthew Prince has threatened to shut down the company's operations in Italy after the country's telecom regulator fined...
Bajram Zeqiri - January 14, 2026
Understanding Data Breach: Protecting Sensitive Information Culture

Understanding Data Breach: Protecting Sensitive Information

One of the most common mistakes, despite the GDPR's implementation since 2018, is to consider only security breaches involving sensitive...
Stefano Gazzella - January 14, 2026
1X NEO Robot Unveils World Model for Advanced Learning Cyber News

1X NEO Robot Unveils World Model for Advanced Learning

1X has released a major update for its NEO humanoid robot , not promising much but introducing a significant change...
Redazione RHC - January 13, 2026

MongoBleed Vulnerability Exploited: Update MongoDB Now to Prevent Data Breach

The Cybersecurity and Infrastructure Security Agency (CISA) has officially raised the alarm about a critical vulnerability in MongoDB, adding the flaw to its catalog of known exploited vulnerabilities (KEVs). This...

Browser-in-the-Browser Phishing Attack: How to Protect Yourself

This article analyzes a recent and sophisticated phishing campaign that uses the Browser-in-the-Browser (BitB) technique to steal credentials, particularly those from services like Microsoft 365. The BitB attack is notable...

Critical WebKit Vulnerability Exposes iOS Devices to Code Execution

A new report details a critical vulnerability discovered by security researcher Joseph Goydish in Apple's WebKit engine. This security flaw, if exploited in conjunction with other exploits, could allow attackers...

Job Scams on Social Media: How to Avoid Fake Remote Job Offers

Fraudulent job ads promising easy money and remote work continue to flood social media, particularly in the Middle East and North Africa . Under the guise of part-time jobs that...

MongoDB Vulnerability CVE-2025-14847: Critical Memory Disclosure Bug

As previously reported, a serious vulnerability has been discovered in MongoDB that allows a remote attacker, without authentication, to access uninitialized server memory. The vulnerability has been assigned the CVE-2025-14847...

UK Boosts Subsea Cable Protection with Autonomous Vessels

The UK government has announced plans to strengthen the protection of undersea cables using autonomous vessels. Military ships and aircraft will also be involved in this "defense." The UK Ministry...

Cyber Criminals Recruit Insiders: Companies at Risk of Internal Threats

The cybercriminal community is rapidly increasing its interest in recruiting personnel from within companies . Instead of sophisticated external attacks, criminals are increasingly relying on internal sources— people willing to...

US Data Center Battery Dependency: A Growing Concern for AI and Defense

In Northern Virginia, along what has come to be called the “data center corridor,” stand massive, windowless facilities that form the physical backbone of the US race to artificial intelligence....

Uzbekistan License Plate Surveillance System Exposed Online

Cybersecurity specialist Anurag Sen discovered that Uzbekistan's license plate recognition system database was freely accessible online: anyone could access all the information . It is unclear how long the system...

Interpol Operation Sentinel Cracks Down on Cybercrime with 574 Arrests

Interpol conducted Operation Sentinel, an international operation that resulted in the arrest of 574 people and the recovery of $3 million stolen through BEC attacks, fraud, and extortion. The operation...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE