Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
320x100 Itcentric
HackTheBox 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Iran Protests Escalate as Reza Pahlavi Calls for Action Against Government Cyber News

Iran Protests Escalate as Reza Pahlavi Calls for Action Against Government

Iranian protesters chanted and marched through the streets until Friday morning, following a call from exiled former Prince Reza Pahlavi...
Redazione RHC - 9 January 2026
Taiwan Citizens Accused in China of Smuggling and Cable Sabotage Cyber News

Taiwan Citizens Accused in China of Smuggling and Cable Sabotage

Chinese authorities have formally charged two Taiwanese citizens with involvement in a smuggling operation linked to an incident in February...
Sandro Sana - 9 January 2026
QR Code Phishing via HTML: New Attack Vector Emerges Cyber News

QR Code Phishing via HTML: New Attack Vector Emerges

We know that criminal hackers always manage to surprise us, and this time too they surprise us with the innovation...
Silvia Felici - 8 January 2026
Veeam Backup Vulnerability: Critical RCE Flaw Discovered – Update Now Vulnerability

Veeam Backup Vulnerability: Critical RCE Flaw Discovered – Update Now

Backups are generally considered the last line of defense, but this week Veeam reminded us that backup systems themselves can...
Agostino Pellegrino - 8 January 2026
GoBruteforcer Botnet Exploits AI-Generated Server Configs, Targets Crypto Cyber News

GoBruteforcer Botnet Exploits AI-Generated Server Configs, Targets Crypto

The GoBruteforcer botnet has been discovered to be exploiting a surprisingly current weakness: the widespread reuse of AI-generated server configurations....
Sandro Sana - 8 January 2026
When Attack Discovery Becomes Automated, Detection Stops Scaling Cyber crime

When Attack Discovery Becomes Automated, Detection Stops Scaling

For much of the past two decades, cybersecurity has been built on a simple assumption: malicious activity can be detected,...
Alexander Rogan - 8 January 2026

TurboDiffusion: AI Video Generation Accelerated Up to 200 Times

Automatic video generation using artificial intelligence took a significant leap on December 25, 2025, when Tsinghua University announced the open source release of TurboDiffusion. The framework, developed by the TSAIL...
Share on Facebook Share on LinkedIn Share on X

OpenAI to Introduce ChatGPT Ads, Revolutionizing AI-Powered Marketing

OpenAI is once again discussing the possibility of introducing advertising into ChatGPT , this time in the form of so-called sponsored content. These aren't traditional banners, but content that could...
Share on Facebook Share on LinkedIn Share on X

Job Scams on Social Media: How to Avoid Fake Remote Job Offers

Fraudulent job ads promising easy money and remote work continue to flood social media, particularly in the Middle East and North Africa . Under the guise of part-time jobs that...
Share on Facebook Share on LinkedIn Share on X

MongoDB Vulnerability CVE-2025-14847: Critical Memory Disclosure Bug

As previously reported, a serious vulnerability has been discovered in MongoDB that allows a remote attacker, without authentication, to access uninitialized server memory. The vulnerability has been assigned the CVE-2025-14847...
Share on Facebook Share on LinkedIn Share on X

UK Boosts Subsea Cable Protection with Autonomous Vessels

The UK government has announced plans to strengthen the protection of undersea cables using autonomous vessels. Military ships and aircraft will also be involved in this "defense." The UK Ministry...
Share on Facebook Share on LinkedIn Share on X

China’s Humanoid Robot Industry Booms with UBtech’s Walker S2

A video, hundreds of humanoid robots, and a reaction that went viral. When UBtech demonstrated its S2 Walkers moving in unison in a Chinese warehouse, it was a stunning sight...
Share on Facebook Share on LinkedIn Share on X

Cyber Criminals Recruit Insiders: Companies at Risk of Internal Threats

The cybercriminal community is rapidly increasing its interest in recruiting personnel from within companies . Instead of sophisticated external attacks, criminals are increasingly relying on internal sources— people willing to...
Share on Facebook Share on LinkedIn Share on X

US Data Center Battery Dependency: A Growing Concern for AI and Defense

In Northern Virginia, along what has come to be called the “data center corridor,” stand massive, windowless facilities that form the physical backbone of the US race to artificial intelligence....
Share on Facebook Share on LinkedIn Share on X

Uzbekistan License Plate Surveillance System Exposed Online

Cybersecurity specialist Anurag Sen discovered that Uzbekistan's license plate recognition system database was freely accessible online: anyone could access all the information . It is unclear how long the system...
Share on Facebook Share on LinkedIn Share on X

Interpol Operation Sentinel Cracks Down on Cybercrime with 574 Arrests

Interpol conducted Operation Sentinel, an international operation that resulted in the arrest of 574 people and the recovery of $3 million stolen through BEC attacks, fraud, and extortion. The operation...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCyber News
“I Stole 120,000 Bitcoins”: The Confession of the Bitfinex Hacker Who Now Wants to Defend Cyberspace
Redazione RHC - 25/01/2026

The story ofIlya Lichtenstein, the hacker responsible for one of the largest cyber attacks ever carried out against cryptocurrencies, reads like an episode of a TV series, yet it is absolutely real. After being released,…

Immagine del sitoCyber News
NoName057(16) hits Italy 487 times in the last 3 months: the DDoS wave does not stop
Redazione RHC - 24/01/2026

Italy has confirmed itself as one of the main targets of the DDoS attack campaign carried out by the hacktivist group NoName057(16) . According to what was declared directly by the collective, our country has…

Immagine del sitoCyber News
NexPhone: Three operating systems in your pocket! The phone that challenges the very concept of a PC.
Redazione RHC - 23/01/2026

The question has been circulating for over ten years: can a smartphone really replace a computer? Over time, the industry has repeatedly attempted to provide a concrete answer, without ever reaching a definitive solution. From…

Immagine del sitoCyber News
BlueNoroff: The Hacker Group Revolutionizing Cybercrime
Redazione RHC - 23/01/2026

The BlueNoroff hacker group has long since transformed cybercrime into a high-tech business, with tens of millions of dollars, cryptocurrency assets, and entire financial ecosystems at stake. A report by Picus Security details the group’s…

Immagine del sitoCyber News
Nearly 2,000 bugs in 100 dating apps: How your data can be stolen
Redazione RHC - 23/01/2026

A study of 100 dating apps revealed a disturbing picture: nearly 2,000 vulnerabilities were detected, 17% of which were classified as critical. The analysis was conducted by AppSec Solutions. The study’s results were published by…