Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Heliaca 320x100 1
Crowdstriker 970×120

Red Hot Cyber. The Cybersecurity Blog

Precedente Successivo

Ultime news

Critical n8n Vulnerability: Update Now to Prevent RCE Attacks Vulnerability

Critical n8n Vulnerability: Update Now to Prevent RCE Attacks

n8n, the “fair-code” workflow automation platform beloved by engineering teams for its combination of low-code speed and programming flexibility, has...
Agostino Pellegrino - 7 January 2026
Ledger Data Breach: Global-e Hack Exposes Customer Info Cyber News

Ledger Data Breach: Global-e Hack Exposes Customer Info

Hackers have infiltrated Global-e's systems, and some Ledger customers are now at risk of receiving highly convincing scam emails. Ledger...
Redazione RHC - 7 January 2026
LED Data Transmission System for Smart Traffic Cyber News

LED Data Transmission System for Smart Traffic

Researchers at Tokyo Polytechnic University have presented a simple and cost-effective wireless data transmission system using LEDs. The project boasts...
Redazione RHC - 7 January 2026
Microsoft Shifts to Rust: AI-Driven Code Transformation by 2030 Cyber News

Microsoft Shifts to Rust: AI-Driven Code Transformation by 2030

Microsoft has launched one of the most ambitious code transformation programs ever announced in the software industry: the stated goal...
Redazione RHC - 7 January 2026
Microsoft’s AI Future: Models to Systems with Satya Nadella Cyber News

Microsoft’s AI Future: Models to Systems with Satya Nadella

With 2026 just around the corner, Microsoft CEO Satya Nadella shared a thoughtful reflection on the state of the AI...
Silvia Felici - 6 January 2026
Rare Earth Elements: US-China Competition Heats Up Cyber News

Rare Earth Elements: US-China Competition Heats Up

An increasingly pressing question is emerging in the United States: after a long series of bans, restrictions, and closures against...
Redazione RHC - 6 January 2026

Cyber Attacks on the Rise: Wiper Malware and Data Destruction in 2025

According to BI.ZONE, by 2025, attackers will increasingly opt for total destruction of corporate infrastructure rather than encryption . This refers to scenarios in which, after penetrating a network, attackers...

MS13-089 Ransomware: Double Extortion Without Encryption

MS13-089 opens a leak site on the dark web, exposes the first data and adopts a double extortion strategy without encryption. A brand built on an old Microsoft ID For...

San Francisco Power Outage Exposes Waymo Self-Driving Car Vulnerabilities

A massive power outage in San Francisco has disrupted self-driving vehicle traffic. Waymo self-driving vehicles have been spotted on city streets, stopped at intersections with their emergency lights on. The...

Microsoft Shifts Activation Process: What It Means for Air-Gapped Systems

In the past, many users and system administrators have relied on Microsoft's telephone activation service to manage installations in specific contexts. During the Windows 8 era, MAK ( Multiple Activation...

PuTTY Under Siege: Hackers Exploit Popular Client for SSH Attacks

Hackers love to exploit the most innocuous tools to infiltrate their targets' networks, and we all know this. And in this case, they're targeting PuTTY , the popular SSH client....

OAuth Device Code Phishing: New Attack Vector for Account Takeover

Cybercriminals are getting smarter and have found a new way to exploit corporate security protocols. It seems incredible, but it's true: they're using a legitimate Microsoft authentication feature to steal...

DIG AI: The Dark Web’s New AI Tool for Cybercrime

A new AI tool has appeared on the dark web and quickly attracted the attention of security experts, and not for the best of reasons. This is an artificial intelligence...

TikTok Accused of Illegally Tracking Users’ Data Across Apps

The popular video app TikTok has found itself at the center of a new scandal over violations of European data protection regulations. The service has been found to track users'...

Naftali Bennett Telegram Account Hacked in Israel Politics

Former Israeli Prime Minister Naftali Bennett has admitted that his Telegram account was hacked, although his device was not compromised. He made the announcement following reports of a hacked iPhone...

Cisco Secure Email Gateway Vulnerability Exploited: Act Now

A critical zero-day flaw in Cisco Secure Email Gateway and Cisco Secure Email and Web Manager devices is causing concern among security researchers. With over 120 vulnerable devices already identified...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCyber News
And let the phishing begin! Microsoft is taking action against a zero-day exploit already exploited in Office
Redazione RHC - 27/01/2026

Once again, Microsoft was forced to quickly fix some flaws. The company has released unscheduled patches for Microsoft Office, addressing a dangerous zero-day vulnerability that has already been exploited in cyberattacks. The issue, identified as…

Immagine del sitoCyber News
ServiceNow Under Attack: How an Email Can Open the Doors to Your Business
Redazione RHC - 27/01/2026

The recent discovery of a vulnerability in ServiceNow’s AI platform has shaken the cybersecurity industry. This flaw, characterized by an extremely high severity score, allowed unauthenticated attackers to impersonate any corporate user. To launch the…

Immagine del sitoCybercrime
149 Million Accounts Exposed: The Database No One Should Have Seen
Redazione RHC - 26/01/2026

A recent leak revealed 149 million logins and passwords exposed online , including accounts for financial services, social media, gaming, and dating sites. The discovery was made by researcher Jeremiah Fowler and shared with ExpressVPN.…

Immagine del sitoCybercrime
When Malware Hides in Videos! The PixelCode Technique Breaks the Rules
Marcello Filacchioni - 26/01/2026

PixelCode began as a research project exploring a hidden technique for storing binary data within images or videos . Instead of leaving a plaintext executable, the file is converted into pixel data, transforming each byte…

Immagine del sitoCyber News
How a simple Visual Studio Code file can become a backdoor for state-run hackers
Redazione RHC - 26/01/2026

Security researchers have recently observed a worrying evolution in the offensive tactics attributed to North Korean-linked actors as part of the campaign known as Contagious Interview : no longer simple fake job interview scams, but…