Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Crowdstrike 320×100
Banner Ransomfeed 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

From Zero-Day Exploits to Hidden Tunnels: How UAT-8837 Operates Cybercrime

From Zero-Day Exploits to Hidden Tunnels: How UAT-8837 Operates

Since early 2025, Cisco Talos specialists have detected the activity of the UAT-8837 group, which they attribute to China based...
Redazione RHC - 17 January 2026
Gootloader Malware Returns with Enhanced Evasion Techniques Cybercrime

Gootloader Malware Returns with Enhanced Evasion Techniques

After a long period of silence, the Gootloader downloader malware has returned to the forefront. Last November, the Huntress team...
Redazione RHC - 17 January 2026
US Considers Ramping Up Cyber Offensive Ops to Counter China Threats Cybercrime

US Considers Ramping Up Cyber Offensive Ops to Counter China Threats

U.S. authorities are actively discussing the need to strengthen offensive cyber activities in the face of ongoing attacks on the...
Redazione RHC - 17 January 2026
French Police Cyberattack Exposed: Weak Passwords Led to Data Breach Cybercrime

French Police Cyberattack Exposed: Weak Passwords Led to Data Breach

During a hearing in the French Senate, Interior Minister Laurent Nuñez detailed the details of the cyberattack that hit his...
Redazione RHC - 17 January 2026
Cisco Zero-Day Vulnerability Exploited: Secure Email Gateway Under Attack Cybercrime

Cisco Zero-Day Vulnerability Exploited: Secure Email Gateway Under Attack

Cisco has confirmed that a critical zero-day security flaw, allowing remote code execution, is currently being actively exploited in its...
Redazione RHC - 16 January 2026
AWS CodeBuild Vulnerability Exposed: CodeBreach Threat Revealed Cybercrime

AWS CodeBuild Vulnerability Exposed: CodeBreach Threat Revealed

Security researchers at Wiz have discovered a critical vulnerability in the AWS CodeBuild service that could allow an attacker to...
Redazione RHC - 16 January 2026

Orion Leaks: LockBit’s Shadow in Ransomware Ecosystem

An in-depth look at the infrastructure connections of emerging group Orion Leaks and its possible connection to former RaaS giant LockBit. In recent months, following Operation Cronos , conducted by...
Share on Facebook Share on LinkedIn Share on X

Cloudflare vs Italy: The Battle for Internet Freedom and DNS Control

Cloudflare CEO Matthew Prince has threatened to shut down the company's operations in Italy after the country's telecom regulator fined it twice its annual revenue in the country. The facts...
Share on Facebook Share on LinkedIn Share on X

Understanding Data Breach: Protecting Sensitive Information

One of the most common mistakes, despite the GDPR's implementation since 2018, is to consider only security breaches involving sensitive data as data breaches. This is often a fatal error...
Share on Facebook Share on LinkedIn Share on X

1X NEO Robot Unveils World Model for Advanced Learning

1X has released a major update for its NEO humanoid robot , not promising much but introducing a significant change to its learning logic. The new module, called 1X World...
Share on Facebook Share on LinkedIn Share on X

Cybercrime Meets Real-Life Violence: Foxtrot Network’s Dark Side

In recent months, there has been increasing talk of a paradigm shift in cybercrime . What for years was perceived as a predominantly digital ecosystem— consisting of fraud, identity theft,...
Share on Facebook Share on LinkedIn Share on X

EDRStartupHinder: Bypassing Windows EDR Security with BindLink

Sometimes, to disable Windows protection , you don't need to attack the antivirus directly. Simply preventing it from starting properly is sufficient. A researcher who goes by the name Two...
Share on Facebook Share on LinkedIn Share on X

Burnout in Cybersecurity: The Hidden Risk to Your Organization

In the world of cybersecurity, we often talk about attacks, vulnerabilities, and incidents. Less is said about a silent variable that runs through the entire sector: fatigue . Not end-of-day...
Share on Facebook Share on LinkedIn Share on X

APT28 Phishing Campaign: Credential Harvesting Tactics

The threat actor APT28 , classified as an Advanced Persistent Threat, active since at least 2004, identified by the alias BlueDelta, but even better known under the name IRON TWILIGHT...
Share on Facebook Share on LinkedIn Share on X

Iran Cyber Crisis: Connettività Compromised

Sometimes important things don't arrive at a press conference. They arrive like a graph that stops breathing: the connectivity line collapses, the OSINT dries up, the noise grows as the...
Share on Facebook Share on LinkedIn Share on X

ServiceNow AI Vulnerability CVE-2025-12420: Critical Security Risk

A critical flaw has been identified in ServiceNow's artificial intelligence platform, with a severity score of 9.3 out of 10. This vulnerability, classified as CVE-2025-12420, could allow attackers to impersonate...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Nearly 2,000 bugs in 100 dating apps: How your data can be stolen
Redazione RHC - 23/01/2026

A study of 100 dating apps revealed a disturbing picture: nearly 2,000 vulnerabilities were detected, 17% of which were classified as critical. The analysis was conducted by AppSec Solutions. The study’s results were published by…

Immagine del sitoCybercrime
MacSync: The macOS malware that empties your wallet… after weeks
Redazione RHC - 23/01/2026

A new malware campaign has emerged in the macOS world, one that relies not on sophisticated exploits, but on good old-fashioned social engineering. It’s powered by the MacSync malware, distributed using the ” malware-as-a-service ”…

Immagine del sitoCybercrime
Larva-25012 Proxyjacking Campaign Targets South Korea with Notepad++ Malware
Redazione RHC - 22/01/2026

A sophisticated proxyjacking campaign is targeting systems in South Korea, attributed to the actor Larva-25012 , which distributes proxyware disguised as legitimate Notepad++ installers. The campaign demonstrates significant technical evolution, using process injection in explorer.exe…

Immagine del sitoCybercrime
PurpleBravo’s Contagious Interview: Malware Campaign Targets Global Firms
Redazione RHC - 22/01/2026

For over a year, the North Korean group PurpleBravo has been running a targeted malware campaign called “Contagious Interview,” using fake job interviews to attack companies in Europe, Asia, the Middle East, and Central America.…

Immagine del sitoCybercrime
KONNI Malware Targets Crypto Developers with AI-Powered Attacks
Redazione RHC - 22/01/2026

Check Point Research recently discovered a sophisticated phishing campaign orchestrated by KONNI , a threat group linked to North Korea . Historically focused on diplomatic targets in South Korea, the malicious actor has now expanded…