Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Cyber Offensive Fundamentals 970x120 V0.1

Red Hot Cyber – News and insights on cybercrime and cybersecurity

Precedente Successivo

Ultime news

Microsoft Removes Phone Activation for Windows and Office Cyber News

Microsoft Removes Phone Activation for Windows and Office

Microsoft has finally removed the option to activate Windows and Office over the phone . While the company still includes...
Redazione RHC - 6 January 2026
PS5 BootROM Key Leaked, Sony’s Security Compromised Cyber News

PS5 BootROM Key Leaked, Sony’s Security Compromised

A recent incident saw an anonymous hacker leak a crucial security key used by Sony to safeguard the integrity of...
Redazione RHC - 5 January 2026
China Achieves Quantum Error Correction Breakthrough with Microchip Cyber News

China Achieves Quantum Error Correction Breakthrough with Microchip

For years, quantum computers have seemed like a futuristic technology: on paper, they can solve problems that classical machines can’t...
Redazione RHC - 5 January 2026
Critical GNU Wget2 Vulnerability Exposes Users to File Overwrite Attacks Cyber News

Critical GNU Wget2 Vulnerability Exposes Users to File Overwrite Attacks

A serious vulnerability has been discovered in the popular GNU command-line downloader Wget2 , which allows attackers to overwrite files...
Massimiliano Brolli - 5 January 2026
Windows 11 Performance Test: Surprising Results with Windows 8.1 Cyber News

Windows 11 Performance Test: Surprising Results with Windows 8.1

A comparison test across six generations of Windows was conducted by YouTube channel TrigrZolt , which unexpectedly revealed a clear...
Redazione RHC - 5 January 2026
PentestAgent: Revolutionizing Penetration Testing with AI-Powered Tools Cyber News

PentestAgent: Revolutionizing Penetration Testing with AI-Powered Tools

PentestAgent is another new open source project developed by the GH05TCREW group that aims to support penetration testing activities through...
Redazione RHC - 5 January 2026

Ink Dragon Hackers Uncovered: Sophisticated Cyber Espionage Operation

It was only a matter of time. Governments around the world have now put their security systems on high alert. Indeed, a large-scale espionage operation conducted by a group of...

Google Discontinues Dark Web Report, Shifts to Active Protection

No more useless alerts. No more passive monitoring. Less than two years after its launch, Google has decided to shut down one of the most talked-about digital security tools: the...

CyberVolk Ransomware Flawed: Free File Recovery Possible

This isn't the first time criminal hackers make mistakes, and it won't be the last. The pro-Russian hacktivist group CyberVolk launched the RaaS service VolkLocker (also known as CyberVolk 2.x)....

OSINT Ethics and Legality: Navigating Open Source Intelligence

Open Source Intelligence (OSINT) has emerged in recent years as one of the most fascinating, yet most insidious, disciplines in the information and security landscape. Its essence is remarkably simple:...

The Psychology of Passwords: Why Weak Passwords Persist

The psychology of passwords starts right here: trying to understand people before systems. Welcome to "The Mind Behind Passwords," the column that looks at cybersecurity. From a different perspective: that...

Russian Cyber Operations Shift to Targeting Western Critical Infrastructure

New details emerge from an Amazon Threat Intelligence report that highlight an alarming shift in Russian government-backed cyber operations. High-level 0-day exploits, often attributed to state-sponsored actors, have seen a...

Google Chrome Security Update Fixes Critical Vulnerabilities

A significant security update has been released by Google for the stable desktop channel, which addresses two very serious vulnerabilities that could expose users to potential memory leak attacks. As...

Spiderman Phishing Kit Targets European Banks and Crypto Users

Varonis researchers have discovered a new PhaaS platform, called Spiderman, that targets users of European banks and cryptocurrency services. Attackers use the service to create copies of legitimate websites to...

AI Smart Glasses for Police: Efficient Vehicle Checks in China

The Changsha traffic police have begun using AI-powered smart glasses in their daily patrols. This was confirmed by the city's Public Security Bureau , which has already distributed the new...

Notepad++ 8.8.9 Released: Fixing Critical Update Vulnerability

A new version, 8.8.9, of the popular text editor Notepad++, has been released by its developers, fixing a flaw in the automatic update system . This issue came to light...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoinnovation
The world’s first humanoid robot store has opened in China. Will we be ready?
Carolina Vivianti - 30/01/2026

At ten o’clock in the morning, in Wuhan, two 1.3-meter-tall humanoid robots begin moving with precision. They turn, jump, and follow a rhythm. It’s the opening signal for the country’s first 7S humanoid robot store,…

Immagine del sitoCulture
Douglas Engelbart was born today: the man who saw and invented the digital future.
Massimiliano Brolli - 30/01/2026

Sometimes, when you think about it, you wonder how we take the world around us for granted. Like, we click, scroll, type, and it all seems so natural, as if it’s always been there. But…

Immagine del sitoCyber News
WhatsApp gets a makeover: “Paranoia” mode arrives (and no, it’s not for everyone).
Silvia Felici - 29/01/2026

WhatsApp has decided to toughen up. Not for everyone, not always, but when needed. The decision comes against a backdrop of a now-familiar climate: increasing cyber attacks, espionage that no longer makes headlines but continues…

Immagine del sitoCybercrime
Beware of “I am not a robot”: the malware trap that uses Google Calendar.
Bajram Zeqiri - 29/01/2026

A new threat is lurking, exploiting our greatest weakness: habit. How many times, in fact, do you find yourself clicking on verification boxes without thinking twice? Now, it seems that malicious people have created a…

Immagine del sitoCybercrime
A blow to the heart of cybercrime: RAMP taken offline. The “temple” of ransomware falls!
Bajram Zeqiri - 28/01/2026

The RAMP (Russian Anonymous Marketplace) forum, one of the main hubs of the international cybercrime underground, has been officially shut down and seized by US law enforcement . The news emerged after the domain associated…