Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Banner Ransomfeed 970x120 1
Precedente Successivo

Latest news

How a simple Visual Studio Code file can become a backdoor for state-run hackers Cyber News

How a simple Visual Studio Code file can become a backdoor for state-run hackers

Security researchers have recently observed a worrying evolution in the offensive tactics attributed to North Korean-linked actors as part of...
Redazione RHC - January 26, 2026
Khaby Lame is selling the rights to his digital identity for $900 million. But there’s reason to think. Cyber News

Khaby Lame is selling the rights to his digital identity for $900 million. But there’s reason to think.

Khaby Lame, the world's most followed Italian creator and now a global social media icon, has taken a step that...
Redazione RHC - January 26, 2026
Microsoft Teams will know where you are: your geographic location will be inferred from your Wi-Fi Cyber News

Microsoft Teams will know where you are: your geographic location will be inferred from your Wi-Fi

Microsoft is preparing to introduce an update that will transform a small manual habit into a system-wide automation. Soon, Microsoft...
Redazione RHC - January 26, 2026
CISA alert: Exploit underway against VMware vCenter. Risk of RCE without authentication. Cyber News

CISA alert: Exploit underway against VMware vCenter. Risk of RCE without authentication.

The critical vulnerability recently added to the Cybersecurity and Infrastructure Security Agency (CISA) catalog of known exploited vulnerabilities (KEVs) affects...
Manuel Roccon - January 25, 2026
Linux 7.0 says goodbye to the HIPPI relic: a piece of supercomputing history has been eliminated. Cyber News

Linux 7.0 says goodbye to the HIPPI relic: a piece of supercomputing history has been eliminated.

The Linux kernel has long been a well-established reality, and while it still contains code for technologies no longer in...
Silvia Felici - January 25, 2026
The Grok scandal: 3 million sexually explicit images generated in 11 days Cyber News

The Grok scandal: 3 million sexually explicit images generated in 11 days

A recent study reveals that in just 11 days of processing, Grok produced approximately 3 million sexually explicit images. The...
Agostino Pellegrino - January 25, 2026

OpenAI API Logs Vulnerability Exposed: Data Exfiltration Risk

Imagine your chatbot worked properly and didn't display a malicious response to the user. But a leak still occurred later, in the most unexpected place, when the developer opened the...

PurpleBravo’s Contagious Interview: Malware Campaign Targets Global Firms

For over a year, the North Korean group PurpleBravo has been running a targeted malware campaign called “Contagious Interview,” using fake job interviews to attack companies in Europe, Asia, the...

KONNI Malware Targets Crypto Developers with AI-Powered Attacks

Check Point Research recently discovered a sophisticated phishing campaign orchestrated by KONNI , a threat group linked to North Korea . Historically focused on diplomatic targets in South Korea, the...

LastPass Phishing Attack: Protect Your Master Password Now

On January 21, 2026, LastPass warned its users about a new and active phishing campaign aimed at stealing customers' master passwords through fake official communications. According to LastPass's Threat Intelligence,...

Zoom Security Alert: Critical Vulnerability in Node MMR Devices

Zoom Video Communications has issued an urgent security advisory for a critical vulnerability (identified as CVE-2026-22844 ) affecting its enterprise infrastructure. The issue involves a command injection flaw in Zoom...

LockBit 5.0 Ransomware: New Threats and Advanced Tactics

The LockBit group, which many had quickly dismissed after high-profile failures and leaks, unexpectedly returned to the scene. In the fall of 2025, it unveiled a new version of its...

Fortinet FortiOS Vulnerability Exploited: CVE-2025-59718 Patch Bypass

Attackers are exploiting a previously patched critical FortiGate authentication flaw (CVE-2025-59718) through a patch bypass method to breach protected firewalls, as Fortinet customers are experiencing. Fortinet reportedly plans to soon...

Cisco Zero-Day Vulnerability CVE-2026-20045 Actively Exploited

A critical zero-day remote code execution (RCE) vulnerability, identified as CVE-2026-20045, has been discovered by Cisco and is being actively exploited in active attacks. Cisco has urged immediate patching, and...

Cybersecurity in Local Administrations: The Hidden Risk

There's a convenient misconception in Italy: thinking that cybersecurity is a matter for ministries or large strategic players. It's reassuring. And it's wrong. In the real design of public connectivity,...

UK Organizations Hit by Russia-Backed DDoS Attacks

The UK's National Cyber Security Centre has issued a strong warning regarding a series of denial-of-service (DDoS) attacks targeting British organizations. This phenomenon has not gone unnoticed by authorities, who...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE