Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Crowdstrike 320×100
TM RedHotCyber 970x120 042543

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Neuralink’s Brain-Computer Implants to Revolutionize Human Life by 2026 Cybercrime

Neuralink’s Brain-Computer Implants to Revolutionize Human Life by 2026

Neuralink, Elon Musk's brain implant company, is preparing to realize what until recently seemed like science fiction. According to Musk,...
Redazione RHC - 3 January 2026
Zero-Day Exploits on the Rise: How to Protect Your Network Cybercrime

Zero-Day Exploits on the Rise: How to Protect Your Network

Until recently, zero-day vulnerabilities seemed like exotic artifacts from the world of special operations and espionage . Now they're a...
Redazione RHC - 2 January 2026
Long-Lived Technologies: COBOL, C, SQL, and Legacy Systems Culture

Long-Lived Technologies: COBOL, C, SQL, and Legacy Systems

While the industry debates which neural network is the “smartest” and which framework is the “most modern,” decades-old technologies continue...
Redazione RHC - 2 January 2026
PollyPolymer Revolutionizes Robotics with 3D Printed Flexible Components Cybercrime

PollyPolymer Revolutionizes Robotics with 3D Printed Flexible Components

When XPeng unveiled its new humanoid robot this year, the spectacle was designed to inspire disbelief. The robot's movements were...
Redazione RHC - 2 January 2026
GlassWorm Malware Targets macOS via Open VSX Extensions Cybercrime

GlassWorm Malware Targets macOS via Open VSX Extensions

A new wave of malicious extensions has been discovered in the Open VSX extension store, used by millions of developers....
Redazione RHC - 2 January 2026
AI Job Losses: Geoffrey Hinton Warns of Widespread Unemployment by 2026 Cybercrime

AI Job Losses: Geoffrey Hinton Warns of Widespread Unemployment by 2026

Computer science professor Geoffrey Hinton , one of the founders of modern artificial intelligence technologies, has claimed that AI could...
Redazione RHC - 2 January 2026

Smart TV Spying: Major Brands Accused of Collecting User Data

Texas Attorney General Ken Paxton has charged five major television manufacturers with illegally collecting user data using automatic content recognition (ACR) technology to record what owners watch. The charges concern...
Share on Facebook Share on LinkedIn Share on X

Phishing Campaigns Exploit File Sharing Services

Researchers at Check Point, a pioneer and global leader in cybersecurity solutions, have discovered a phishing campaign in which attackers pose as file-sharing and electronic signature services to send financially-themed...
Share on Facebook Share on LinkedIn Share on X

RansomHouse Ransomware Upgraded: Enhanced Encryption Threat

The group behind RansomHouse, one of the most notorious ransomware distribution services, has strengthened the technical capabilities of its attacks. According to experts, the cybercriminals have added an updated encryption...
Share on Facebook Share on LinkedIn Share on X

Cyber Attacks on the Rise: Wiper Malware and Data Destruction in 2025

According to BI.ZONE, by 2025, attackers will increasingly opt for total destruction of corporate infrastructure rather than encryption . This refers to scenarios in which, after penetrating a network, attackers...
Share on Facebook Share on LinkedIn Share on X

MS13-089 Ransomware: Double Extortion Without Encryption

MS13-089 opens a leak site on the dark web, exposes the first data and adopts a double extortion strategy without encryption. A brand built on an old Microsoft ID For...
Share on Facebook Share on LinkedIn Share on X

San Francisco Power Outage Exposes Waymo Self-Driving Car Vulnerabilities

A massive power outage in San Francisco has disrupted self-driving vehicle traffic. Waymo self-driving vehicles have been spotted on city streets, stopped at intersections with their emergency lights on. The...
Share on Facebook Share on LinkedIn Share on X

Microsoft Shifts Activation Process: What It Means for Air-Gapped Systems

In the past, many users and system administrators have relied on Microsoft's telephone activation service to manage installations in specific contexts. During the Windows 8 era, MAK ( Multiple Activation...
Share on Facebook Share on LinkedIn Share on X

PuTTY Under Siege: Hackers Exploit Popular Client for SSH Attacks

Hackers love to exploit the most innocuous tools to infiltrate their targets' networks, and we all know this. And in this case, they're targeting PuTTY , the popular SSH client....
Share on Facebook Share on LinkedIn Share on X

OAuth Device Code Phishing: New Attack Vector for Account Takeover

Cybercriminals are getting smarter and have found a new way to exploit corporate security protocols. It seems incredible, but it's true: they're using a legitimate Microsoft authentication feature to steal...
Share on Facebook Share on LinkedIn Share on X

DIG AI: The Dark Web’s New AI Tool for Cybercrime

A new AI tool has appeared on the dark web and quickly attracted the attention of security experts, and not for the best of reasons. This is an artificial intelligence...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Two Ukrainians Suspected in Black Basta Ransomware Attacks
Redazione RHC - 17/01/2026

When it comes to cybersecurity, it’s not uncommon to come across news stories that seem straight out of a science fiction movie. Yet, the reality is even more surprising and sometimes disturbing. The story of…

Immagine del sitoCybercrime
Gootloader Malware Returns with Enhanced Evasion Techniques
Redazione RHC - 17/01/2026

After a long period of silence, the Gootloader downloader malware has returned to the forefront. Last November, the Huntress team detected a new campaign signaling the return of a developer previously associated with the Vanilla…

Immagine del sitoCybercrime
VoidLink Malware: Advanced Linux Framework Targets Cloud Infrastructures
Redazione RHC - 16/01/2026

Check Point researchers have discovered a new Linux infection framework distinguished by its advanced modular architecture and wide range of features. The malware has been dubbed VoidLink . The framework is composed of over 30…

Immagine del sitoCybercrime
Microsoft Copilot Vulnerability Exposes User Data to Hackers
Redazione RHC - 15/01/2026

A recently fixed vulnerability allowed attackers to exploit Microsoft Copilot Personal with a single click to steal sensitive user data. Using a phishing link, attackers were able to take control of sessions without requiring further…

Immagine del sitoCybercrime
Progress Software Patches LoadMaster, MOVEit WAF Vulnerabilities
Redazione RHC - 15/01/2026

On January 12, 2026, Progress Software Corporation released patches that address two high-severity Command Injection vulnerabilities, which could allow remote attackers to execute malicious code on LoadMaster load balancers and MOVEit Web Application Firewalls (WAFs).…