Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Banner Desktop
Precedente Successivo

Latest news

Ancient Chinese Silk Loom: The World’s First Computer? Cyber News

Ancient Chinese Silk Loom: The World’s First Computer?

When you evaluate a computer not just by its outer casing and display, but fundamentally as a machine that accepts...
Redazione RHC - January 3, 2026
Neuralink’s Brain-Computer Implants to Revolutionize Human Life by 2026 Cyber News

Neuralink’s Brain-Computer Implants to Revolutionize Human Life by 2026

Neuralink, Elon Musk's brain implant company, is preparing to realize what until recently seemed like science fiction. According to Musk,...
Redazione RHC - January 3, 2026
Zero-Day Exploits on the Rise: How to Protect Your Network Cyber News

Zero-Day Exploits on the Rise: How to Protect Your Network

Until recently, zero-day vulnerabilities seemed like exotic artifacts from the world of special operations and espionage . Now they're a...
Pietro Melillo - January 2, 2026
Long-Lived Technologies: COBOL, C, SQL, and Legacy Systems Cyber News

Long-Lived Technologies: COBOL, C, SQL, and Legacy Systems

While the industry debates which neural network is the “smartest” and which framework is the “most modern,” decades-old technologies continue...
Redazione RHC - January 2, 2026
PollyPolymer Revolutionizes Robotics with 3D Printed Flexible Components Cyber News

PollyPolymer Revolutionizes Robotics with 3D Printed Flexible Components

When XPeng unveiled its new humanoid robot this year, the spectacle was designed to inspire disbelief. The robot's movements were...
Redazione RHC - January 2, 2026
GlassWorm Malware Targets macOS via Open VSX Extensions Cyber News

GlassWorm Malware Targets macOS via Open VSX Extensions

A new wave of malicious extensions has been discovered in the Open VSX extension store, used by millions of developers....
Massimiliano Brolli - January 2, 2026

SOAP Vulnerability in .NET Framework Allows Remote Code Execution

Security researchers have discovered a vulnerability in .NET that could affect several enterprise products and lead to remote code execution. The issue stems from the way Microsoft .NET-based applications handle...

CVE-2025-55182 React Server Components Vulnerability Exploited

A recent report from the Google Threat Intelligence Group (GTIG) illustrates the chaotic results of this information dissemination, highlighting how savvy adversaries have already gained a foothold within targeted networks....

Top 25 Software Vulnerabilities 2025: MITRE CWE Ranking and Security Tips

MITRE has released its ranking of the 25 most dangerous software vulnerabilities predicted for 2025, based on data collected through the National Vulnerability Database. These vulnerabilities were identified by analyzing...

The Future of Work: 4-Day Week with AI and Tech Advances

The prospect of a four-day workweek, with a resulting three-day long weekend, may not be far off. This is according to Christopher A. Pissarides , a British-Cypriot economist and Nobel...

ARTEMIS Leads in AI-Powered Pentesting, Outperforming Human Experts

Stanford researchers and their colleagues conducted an unusual experiment: they compared the performance of ten professional specialists and a set of autonomous AI agents in a real-world corporate pentest. The...

Apple Patches Critical WebKit Vulnerabilities in iOS Update

Following the discovery of two critical zero-day vulnerabilities in the WebKit browser engine, Apple has urgently released security updates for iPhone and iPad users. Both vulnerabilities reside in WebKit ,...

Kali Linux 2025.4: Discover the Power of Wayland and Enhanced Security Tools

The recent 2025.4 release of Kali Linux has been made available to the public, introducing significant improvements to the GNOME, KDE, and Xfce desktop environments . From now on, Wayland...

French Interior Ministry Hit by Cyberattack, Data Security at Risk

The French Ministry of the Interior's email servers were targeted by a cyberattack. The hacker managed to access "several files," but no "serious compromise" has been detected so far. The...

IRS.GOV: alleged data breach affects the accounts of 18 million citizens

An alleged database containing sensitive information on 18 million U.S. citizens over 65 has appeared for sale on a popular dark web forum. The advertiser, who uses the pseudonym "Frenshyny,"...

Amnesty International Launches .onion Site for Secure Access to Human Rights Info

Amnesty International has launched its own website, accessible via the .onion domain on the Tor network, offering a new secure channel for accessing the organization's information and research. The initiative,...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE