Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

970x120 Enterprise 1
Precedente Successivo

Latest news

When Attack Discovery Becomes Automated, Detection Stops Scaling Cybercrime

When Attack Discovery Becomes Automated, Detection Stops Scaling

For much of the past two decades, cybersecurity has been built on a simple assumption: malicious activity can be detected,...
Alexander Rogan - January 8, 2026
VMware ESXi VM Escape Exploit: Advanced Threats Revealed Cyber News

VMware ESXi VM Escape Exploit: Advanced Threats Revealed

A new report published by the Huntress Tactical Response Team documents a highly sophisticated intrusion detected in December 2025 ,...
Silvia Felici - January 8, 2026
Supply Chain Security: Protect Your Business from Cyber Threats Cyber News

Supply Chain Security: Protect Your Business from Cyber Threats

In an increasingly interconnected digital ecosystem, companies depend on networks of suppliers and partners to operate efficiently. However, this interdependence...
Redazione RHC - January 8, 2026
CVE-2026-21858: n8n Vulnerability Exposes Thousands of Servers to RCE Vulnerability

CVE-2026-21858: n8n Vulnerability Exposes Thousands of Servers to RCE

The vulnerability, identified as CVE-2026-21858, which we recently reported on, affects approximately 100,000 servers worldwide, threatening to expose proprietary API...
Agostino Pellegrino - January 8, 2026
Malware PHALT#BLYX Uses Social Engineering and MSBuild to Infect Systems Cyber News

Malware PHALT#BLYX Uses Social Engineering and MSBuild to Infect Systems

A cancellation message from Booking.com with a high penalty seems like a typical business practice for hotels and apartments. But...
Redazione RHC - January 7, 2026
DevSecOps: Integrating Security into Your Development Process Cybercrime

DevSecOps: Integrating Security into Your Development Process

When it comes to application security, there's rarely a single problem. It's almost always a chain of small flaws, poor...
Massimiliano Brolli - January 7, 2026

Google and Apple Embrace Interoperability with Android iOS Data Transfer

Users looking to switch from an iOS to Android ecosystem or vice versa often face less of a challenge than easily transferring photos, conversation logs, and archives from previous devices....

Ink Dragon Targets Europe: Exploiting SharePoint and IIS Vulnerabilities

This news comes to us from Recorded Future (Insikt Group) News & Research feed: Check Point Research has documented a new wave of activity attributed to the China-linked threat actor...

Bypassing AI Safety: EchoGram Exposes Vulnerabilities in LLM Defenses

Large language models are typically released with security constraints : separate AIs from the main LLM ensure that malicious suggestions aren't passed as input and malicious responses aren't produced as...

French Police Arrest Suspect in Cyberattack on Interior Ministry

French law enforcement has arrested a 22-year-old man suspected of carrying out a recent cyberattack on the Ministry of the Interior. The attack occurred in mid-December and targeted the agency's...

Google Unveils Gemini 3 Flash AI Model, Rivals OpenAI GPT-5.2

The battle for AI leadership is increasingly moving from the lab to mass production. The day after the release of OpenAI GPT Image 1.5, Google unveiled the Gemini 3 Flash...

Rise of AI Degrees: Students Shift from Computer Science to AI

A marked shift in college student preferences is taking place in the United States. More and more young people are choosing degrees in artificial intelligence, abandoning traditional computer science, which...

SonicWall SMA1000 Vulnerability: Critical Security Patch Released

Researchers have discovered a vulnerability, identified as CVE-2025-40602, affecting SonicWall's SMA1000 series of secure access gateways. This flaw is particularly concerning because it could allow an attacker to escalate their...

Ink Dragon Hackers Uncovered: Sophisticated Cyber Espionage Operation

It was only a matter of time. Governments around the world have now put their security systems on high alert. Indeed, a large-scale espionage operation conducted by a group of...

Google Discontinues Dark Web Report, Shifts to Active Protection

No more useless alerts. No more passive monitoring. Less than two years after its launch, Google has decided to shut down one of the most talked-about digital security tools: the...

CyberVolk Ransomware Flawed: Free File Recovery Possible

This isn't the first time criminal hackers make mistakes, and it won't be the last. The pro-Russian hacktivist group CyberVolk launched the RaaS service VolkLocker (also known as CyberVolk 2.x)....

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE