Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Cyber Offensive Fundamentals 970x120 V0.1

Latest news

Burnout in Cybersecurity: The Hidden Risk to Your Organization Culture

Burnout in Cybersecurity: The Hidden Risk to Your Organization

In the world of cybersecurity, we often talk about attacks, vulnerabilities, and incidents. Less is said about a silent variable...
Paloma Donadi - January 13, 2026
APT28 Phishing Campaign: Credential Harvesting Tactics Cybercrime

APT28 Phishing Campaign: Credential Harvesting Tactics

The threat actor APT28 , classified as an Advanced Persistent Threat, active since at least 2004, identified by the alias...
Lorenzo Nardi - January 13, 2026
Poisoning AI Data: The New Threat to Machine Learning Models Cyber News

Poisoning AI Data: The New Threat to Machine Learning Models

A bold new initiative has been launched in the artificial intelligence industry to weaken machine learning models by deliberately distorting...
Luca Vinciguerra - January 12, 2026
Pig Butchering Scams Evolve with PBaaS: The New Threat Cyber News

Pig Butchering Scams Evolve with PBaaS: The New Threat

Online scams known as "pig butchering" are undergoing a profound transformation. From artisanal and disorganized operations , based on makeshift...
Bajram Zeqiri - January 12, 2026
Apache Struts 2 Vulnerability CVE-2025-68493 Exposes Sensitive Data Cyber News

Apache Struts 2 Vulnerability CVE-2025-68493 Exposes Sensitive Data

A new flaw has emerged in the foundation of one of the most popular Java frameworks on the web. Cybersecurity...
Agostino Pellegrino - January 12, 2026
Uncovering Dark AI: The Truth Behind Crime-as-a-Service Chatbots Cyber News

Uncovering Dark AI: The Truth Behind Crime-as-a-Service Chatbots

In recent months, the cybersecurity landscape has been awash with media hype surrounding new AI Dark Chatbots promoted as "Crime-as-a-Service"...
Bajram Zeqiri - January 12, 2026
AI-Generated Mac Malware: SimpleStealth Threatens User Security Cyber News

AI-Generated Mac Malware: SimpleStealth Threatens User Security

A group of industry specialists has identified for the first time a macOS malware whose code clearly shows signs of...
Massimiliano Brolli - January 11, 2026
The Future of Tech: Sovereignty, Security, and Cloud Control Cyber News

The Future of Tech: Sovereignty, Security, and Cloud Control

In today's world, technology is no longer a mere tool for efficiency or convenience, but a primary geopolitical lever ....
Silvia Felici - January 11, 2026
Phishing Emails Mimic Internal Comms via Microsoft 365 Spoofing Cyber News

Phishing Emails Mimic Internal Comms via Microsoft 365 Spoofing

Phishing attacks are becoming increasingly insidious, to the point of perfectly mimicking internal corporate communications . This is the alarm...
Pietro Melillo - January 10, 2026
Lovense Emily AI Doll: Revolutionary Companion at CES 2026 Cyber News

Lovense Emily AI Doll: Revolutionary Companion at CES 2026

At CES 2026 in Las Vegas, Lovense , known for its app-controlled smart toys for adults , decided to make...
Luca Vinciguerra - January 9, 2026
The Revolutionary iPhone Launch: A Game-Changing Moment in Tech History Culture

The Revolutionary iPhone Launch: A Game-Changing Moment in Tech History

San Francisco: January 9, 2007 There was something strange about the air, like when you know something's about to happen...
Gaia Russo - January 9, 2026
Cloudflare Hit with €14M Fine for Failing to Block Pirate Content Cyber News

Cloudflare Hit with €14M Fine for Failing to Block Pirate Content

The Italian Communications Regulatory Authority (AGCOM) has imposed an administrative fine exceeding €14 million on Cloudflare Inc. for failure to...
Redazione RHC - January 9, 2026

Linux 7.0 says goodbye to the HIPPI relic: a piece of supercomputing history has been eliminated.

The Linux kernel has long been a well-established reality, and while it still contains code for technologies no longer in use, it's likely that some people still rely on these...

“I Stole 120,000 Bitcoins”: The Confession of the Bitfinex Hacker Who Now Wants to Defend Cyberspace

The story ofIlya Lichtenstein, the hacker responsible for one of the largest cyber attacks ever carried out against cryptocurrencies, reads like an episode of a TV series, yet it is...

A working browser built with AI using 3 million lines of code: breakthrough or illusion?

A week ago, Cursor CEO Michael Truell announced a supposedly remarkable achievement. He claimed that, using GPT-5.2, Cursor had created a browser capable of running continuously for an entire week....

Kimwolf: The IoT botnet that moves silently across corporate and government networks

The Kimwolf botnet represents one of the most insidious IoT threats to emerge recently. According to the latest analyses, this malicious infrastructure has already compromised over two million devices ,...

NoName057(16) hits Italy 487 times in the last 3 months: the DDoS wave does not stop

Italy has confirmed itself as one of the main targets of the DDoS attack campaign carried out by the hacktivist group NoName057(16) . According to what was declared directly by...

Undersea Cables: Ignored Warnings and Uncertain Trials. The Truth About Underwater Accidents

In recent years, Taiwan has seen a series of incidents in which its undersea cables have been damaged or destroyed, creating damage to critical infrastructure and political tensions. The Control...

CISA Updates Vulnerability Catalog: New Cybersecurity Threats

The Cybersecurity and Infrastructure Security Agency (CISA) has updated its catalog of known exploited vulnerabilities (KEVs) with four new entries , demonstrating that hackers are actively exploiting vulnerabilities in popular...

NexPhone: Three operating systems in your pocket! The phone that challenges the very concept of a PC.

The question has been circulating for over ten years: can a smartphone really replace a computer? Over time, the industry has repeatedly attempted to provide a concrete answer, without ever...

BlueNoroff: The Hacker Group Revolutionizing Cybercrime

The BlueNoroff hacker group has long since transformed cybercrime into a high-tech business, with tens of millions of dollars, cryptocurrency assets, and entire financial ecosystems at stake. A report by...

Your MFA is no longer enough: Phishing kits bypass multi-factor authentication

The amount of PhaaS kit has doubled since last year, according to an analysis by Barracuda Networks, placing increased pressure on security teams. Aggressive newcomers Whisper 2FA and GhostFrame introduced...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE