Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

HackTheBox 970x120 1
Precedente Successivo

Latest news

Beware of “I am not a robot”: the malware trap that uses Google Calendar. Cybercrime

Beware of “I am not a robot”: the malware trap that uses Google Calendar.

A new threat is lurking, exploiting our greatest weakness: habit. How many times, in fact, do you find yourself clicking...
Bajram Zeqiri - January 29, 2026
WinRAR as a Weapon: Google Discovers a Vulnerability Exploited by APTs and Cybercriminals Cybercrime

WinRAR as a Weapon: Google Discovers a Vulnerability Exploited by APTs and Cybercriminals

The WinRAR security flaw, which emerged last summer, has become more widespread than expected. Several organizations, both common criminals and...
Bajram Zeqiri - January 29, 2026
Latin America under digital siege: the numbers that worry experts Culture

Latin America under digital siege: the numbers that worry experts

In recent months, Latin America and the Caribbean have become the most targeted region by cyberattacks globally, surpassing Africa in...
Marcello Filacchioni - January 29, 2026
A blow to the heart of cybercrime: RAMP taken offline. The “temple” of ransomware falls! Cybercrime

A blow to the heart of cybercrime: RAMP taken offline. The “temple” of ransomware falls!

The RAMP (Russian Anonymous Marketplace) forum, one of the main hubs of the international cybercrime underground, has been officially shut...
Bajram Zeqiri - January 28, 2026
Is privacy dead? No, but it’s in a coma! What are we really celebrating today, January 28th? Culture

Is privacy dead? No, but it’s in a coma! What are we really celebrating today, January 28th?

Today is January 28th, and like every year for quite some time now, we find ourselves celebrating European Data Protection...
Silvia Felici - January 28, 2026
n8n Alert: Two critical RCE vulnerabilities discovered (CVE-2026-1470). Update now! Cyber News

n8n Alert: Two critical RCE vulnerabilities discovered (CVE-2026-1470). Update now!

The n8n platform, a widely adopted open source software for orchestrating enterprise automation and workflows, was recently at the center...
Redazione RHC - January 28, 2026

33,000 tons of iron… and an investigation where AIS and logs are cyber intelligence traps

A recent operation in the port of Brindisi, conducted by the Guardia di Finanza in collaboration with the Customs and Monopolies Agency (ADM) and coordinated by the Brindisi Public Prosecutor's...

Email Security Under Pressure: Phishing Kits to Double in 2025

According to Barracuda’s Phishing Report 2025 , the number of phishing-as-a-service (PhaaS) kits is expected to double by 2025, placing increasing pressure on security teams to combat an increasingly evolving...

How a simple Visual Studio Code file can become a backdoor for state-run hackers

Security researchers have recently observed a worrying evolution in the offensive tactics attributed to North Korean-linked actors as part of the campaign known as Contagious Interview : no longer simple...

Khaby Lame is selling the rights to his digital identity for $900 million. But there’s reason to think.

Khaby Lame, the world's most followed Italian creator and now a global social media icon, has taken a step that could mark a turning point in the history of the...

Microsoft Teams will know where you are: your geographic location will be inferred from your Wi-Fi

Microsoft is preparing to introduce an update that will transform a small manual habit into a system-wide automation. Soon, Microsoft Teams will be able to infer and display a user's...

Linux 7.0 says goodbye to the HIPPI relic: a piece of supercomputing history has been eliminated.

The Linux kernel has long been a well-established reality, and while it still contains code for technologies no longer in use, it's likely that some people still rely on these...

“I Stole 120,000 Bitcoins”: The Confession of the Bitfinex Hacker Who Now Wants to Defend Cyberspace

The story ofIlya Lichtenstein, the hacker responsible for one of the largest cyber attacks ever carried out against cryptocurrencies, reads like an episode of a TV series, yet it is...

A working browser built with AI using 3 million lines of code: breakthrough or illusion?

A week ago, Cursor CEO Michael Truell announced a supposedly remarkable achievement. He claimed that, using GPT-5.2, Cursor had created a browser capable of running continuously for an entire week....

Kimwolf: The IoT botnet that moves silently across corporate and government networks

The Kimwolf botnet represents one of the most insidious IoT threats to emerge recently. According to the latest analyses, this malicious infrastructure has already compromised over two million devices ,...

NoName057(16) hits Italy 487 times in the last 3 months: the DDoS wave does not stop

Italy has confirmed itself as one of the main targets of the DDoS attack campaign carried out by the hacktivist group NoName057(16) . According to what was declared directly by...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE