Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Crowdstriker 970×120
Precedente Successivo

Latest news

Is privacy dead? No, but it’s in a coma! What are we really celebrating today, January 28th? Culture

Is privacy dead? No, but it’s in a coma! What are we really celebrating today, January 28th?

Today is January 28th, and like every year for quite some time now, we find ourselves celebrating European Data Protection...
Silvia Felici - January 28, 2026
n8n Alert: Two critical RCE vulnerabilities discovered (CVE-2026-1470). Update now! Cyber News

n8n Alert: Two critical RCE vulnerabilities discovered (CVE-2026-1470). Update now!

The n8n platform, a widely adopted open source software for orchestrating enterprise automation and workflows, was recently at the center...
Redazione RHC - January 28, 2026
Telnet, the return of a ghost. A 2015 bug exploited in 2026: 800,000 devices at risk. Cyber News

Telnet, the return of a ghost. A 2015 bug exploited in 2026: 800,000 devices at risk.

GNU InetUtils is a collection of network utilities (including telnet/telnetd, ftp/ftpd, rsh/rshd, ping, and traceroute) used by several Linux distributions....
Pietro Melillo - January 28, 2026
OpenSSL: 12 security bugs found, including a critical vulnerability Cyber News

OpenSSL: 12 security bugs found, including a critical vulnerability

A security update has been released by maintainers of OpenSSL, the cryptographic library, addressing about a dozen vulnerabilities, including logic...
Bajram Zeqiri - January 28, 2026
Digital Autonomy: France Says Goodbye to Teams and Zoom by 2027 Cyberpolitics

Digital Autonomy: France Says Goodbye to Teams and Zoom by 2027

This isn't the first initiative to emerge on this front recently. Indeed, we've heard several of them, one after the...
Silvia Felici - January 28, 2026
Fortinet Vulnerability CVE-2026-24858: Hackers Inside Networks with Legitimate Credentials Cyber News

Fortinet Vulnerability CVE-2026-24858: Hackers Inside Networks with Legitimate Credentials

A serious flaw, classified as CVE-2026-24858, has been confirmed to be exploited in real-world attacks against vulnerable devices. This isn't...
Bajram Zeqiri - January 28, 2026

Kimwolf: The IoT botnet that moves silently across corporate and government networks

The Kimwolf botnet represents one of the most insidious IoT threats to emerge recently. According to the latest analyses, this malicious infrastructure has already compromised over two million devices ,...

NoName057(16) hits Italy 487 times in the last 3 months: the DDoS wave does not stop

Italy has confirmed itself as one of the main targets of the DDoS attack campaign carried out by the hacktivist group NoName057(16) . According to what was declared directly by...

Undersea Cables: Ignored Warnings and Uncertain Trials. The Truth About Underwater Accidents

In recent years, Taiwan has seen a series of incidents in which its undersea cables have been damaged or destroyed, creating damage to critical infrastructure and political tensions. The Control...

CISA Updates Vulnerability Catalog: New Cybersecurity Threats

The Cybersecurity and Infrastructure Security Agency (CISA) has updated its catalog of known exploited vulnerabilities (KEVs) with four new entries , demonstrating that hackers are actively exploiting vulnerabilities in popular...

NexPhone: Three operating systems in your pocket! The phone that challenges the very concept of a PC.

The question has been circulating for over ten years: can a smartphone really replace a computer? Over time, the industry has repeatedly attempted to provide a concrete answer, without ever...

BlueNoroff: The Hacker Group Revolutionizing Cybercrime

The BlueNoroff hacker group has long since transformed cybercrime into a high-tech business, with tens of millions of dollars, cryptocurrency assets, and entire financial ecosystems at stake. A report by...

Your MFA is no longer enough: Phishing kits bypass multi-factor authentication

The amount of PhaaS kit has doubled since last year, according to an analysis by Barracuda Networks, placing increased pressure on security teams. Aggressive newcomers Whisper 2FA and GhostFrame introduced...

Nearly 2,000 bugs in 100 dating apps: How your data can be stolen

A study of 100 dating apps revealed a disturbing picture: nearly 2,000 vulnerabilities were detected, 17% of which were classified as critical. The analysis was conducted by AppSec Solutions. The...

MacSync: The macOS malware that empties your wallet… after weeks

A new malware campaign has emerged in the macOS world, one that relies not on sophisticated exploits, but on good old-fashioned social engineering. It's powered by the MacSync malware, distributed...

He arrived in America with $200 and ended up in a reformatory: today he controls 90% of the world’s AI

How three insiders with just $200 in their pockets reached a market capitalization of $5 trillion and created the company that powers over 90% of artificial intelligence. Kentucky, 1972. A...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE