Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Crowdstriker 970×120
Precedente Successivo

Latest news

AWS CodeBuild Vulnerability Exposed: CodeBreach Threat Revealed Cyber News

AWS CodeBuild Vulnerability Exposed: CodeBreach Threat Revealed

Security researchers at Wiz have discovered a critical vulnerability in the AWS CodeBuild service that could allow an attacker to...
Agostino Pellegrino - January 16, 2026
Microsoft Patches Zero-Day NTFS Vulnerabilities in Windows 11 and Server Cyber News

Microsoft Patches Zero-Day NTFS Vulnerabilities in Windows 11 and Server

Microsoft released a security update in January that addresses two serious zero-day vulnerabilities in the NTFS file system. The vulnerabilities...
Pietro Melillo - January 16, 2026
AVCheck Malware Service Shut Down: Dutch Man Arrested for Cybercrime Cyber News

AVCheck Malware Service Shut Down: Dutch Man Arrested for Cybercrime

Law enforcement has announced the arrest of a 33-year-old Dutch citizen on suspicion of operating the AVCheck platform, an online...
Redazione RHC - January 16, 2026
VoidLink Malware: Advanced Linux Framework Targets Cloud Infrastructures Cyber News

VoidLink Malware: Advanced Linux Framework Targets Cloud Infrastructures

Check Point researchers have discovered a new Linux infection framework distinguished by its advanced modular architecture and wide range of...
Massimiliano Brolli - January 16, 2026
Microsoft Ends Support for Windows Server 2008: What It Means Cyber News

Microsoft Ends Support for Windows Server 2008: What It Means

This week marked the end of an era: Microsoft finally ended support for Windows Server 2008 , the operating system...
Redazione RHC - January 16, 2026
The AI Energy Crisis: How Data Centers Are Reshaping US Power Costs Cyber News

The AI Energy Crisis: How Data Centers Are Reshaping US Power Costs

The accelerated growth of artificial intelligence is bringing with it an increasingly obvious consequence : rising energy demand. This issue...
Luca Vinciguerra - January 15, 2026

US Treasury Removes Sanctions on Intellexa Spyware Developers

The U.S. Treasury Department unexpectedly removed from its sanctions list three individuals previously accused of ties to Intellexa , the developer of the Predator spyware . The decision was made...

Rue Language: Revolutionizing System Programming with AI

Veteran software developer Steve Klabnik, who helped create Rust and Ruby on Rails, has started work on a new programming language called Rue . The name may seem ambiguous— it...

Password Security: The Impact of Human Behavior on Password Strength

Password security and human behavior are more connected than we think. In previous episodes, we tried to shift our focus: passwords don't just protect systems, they tell stories about people....

Potential Data Breach at Pickett USA Exposes Critical Energy Infrastructure

An unknown attacker claims to have hacked Pickett and Associates (Pickett USA), a Florida-based engineering firm, and is now selling a large amount of engineering data related to projects managed...

Forensic Timeliner: Advanced Digital Forensics Tool for DFIR Analysis

Forensic Timeliner is a high-performance forensic processing engine designed to support DFIR (Digital Forensics and Incident Response ) analysts in artifact triage and correlation. The tool allows you to quickly...

Google Unveils Nano Banana 2 Flash for Rapid Image Generation

Google is preparing to introduce a new generative AI model for image processing: the Nano Banana 2 Flash . It will be part of its Flash lineup , which focuses...

Ancient Chinese Silk Loom: The World’s First Computer?

When you evaluate a computer not just by its outer casing and display, but fundamentally as a machine that accepts directions, performs actions automatically, and delivers results, a contender for...

Zero-Day Exploits on the Rise: How to Protect Your Network

Until recently, zero-day vulnerabilities seemed like exotic artifacts from the world of special operations and espionage . Now they're a common tool for hacking corporate networks, and not just because...

Long-Lived Technologies: COBOL, C, SQL, and Legacy Systems

While the industry debates which neural network is the “smartest” and which framework is the “most modern,” decades-old technologies continue to quietly swirl beneath the surface of the banking industry...

PollyPolymer Revolutionizes Robotics with 3D Printed Flexible Components

When XPeng unveiled its new humanoid robot this year, the spectacle was designed to inspire disbelief. The robot's movements were so lifelike that company founder He Xiaopeng had to cut...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE