Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

970x20 Itcentric
Precedente Successivo

Latest news

CISA alert: Exploit underway against VMware vCenter. Risk of RCE without authentication. Cyber News

CISA alert: Exploit underway against VMware vCenter. Risk of RCE without authentication.

The critical vulnerability recently added to the Cybersecurity and Infrastructure Security Agency (CISA) catalog of known exploited vulnerabilities (KEVs) affects...
Manuel Roccon - January 25, 2026
Linux 7.0 says goodbye to the HIPPI relic: a piece of supercomputing history has been eliminated. Cyber News

Linux 7.0 says goodbye to the HIPPI relic: a piece of supercomputing history has been eliminated.

The Linux kernel has long been a well-established reality, and while it still contains code for technologies no longer in...
Silvia Felici - January 25, 2026
The Grok scandal: 3 million sexually explicit images generated in 11 days Cyber News

The Grok scandal: 3 million sexually explicit images generated in 11 days

A recent study reveals that in just 11 days of processing, Grok produced approximately 3 million sexually explicit images. The...
Agostino Pellegrino - January 25, 2026
“I Stole 120,000 Bitcoins”: The Confession of the Bitfinex Hacker Who Now Wants to Defend Cyberspace Cyber News

“I Stole 120,000 Bitcoins”: The Confession of the Bitfinex Hacker Who Now Wants to Defend Cyberspace

The story ofIlya Lichtenstein, the hacker responsible for one of the largest cyber attacks ever carried out against cryptocurrencies, reads...
Agostino Pellegrino - January 25, 2026
AGI: Google and Anthropic CEOs sound the alarm at Davos – the world won’t be ready! Cyber News

AGI: Google and Anthropic CEOs sound the alarm at Davos – the world won’t be ready!

If there were any doubts about whether the world's leading AI companies agreed on the direction of AI, or how...
Redazione RHC - January 24, 2026
A working browser built with AI using 3 million lines of code: breakthrough or illusion? Cyber News

A working browser built with AI using 3 million lines of code: breakthrough or illusion?

A week ago, Cursor CEO Michael Truell announced a supposedly remarkable achievement. He claimed that, using GPT-5.2, Cursor had created...
Redazione RHC - January 24, 2026

Cisco Zero-Day Vulnerability CVE-2026-20045 Actively Exploited

A critical zero-day remote code execution (RCE) vulnerability, identified as CVE-2026-20045, has been discovered by Cisco and is being actively exploited in active attacks. Cisco has urged immediate patching, and...

Cybersecurity in Local Administrations: The Hidden Risk

There's a convenient misconception in Italy: thinking that cybersecurity is a matter for ministries or large strategic players. It's reassuring. And it's wrong. In the real design of public connectivity,...

UK Organizations Hit by Russia-Backed DDoS Attacks

The UK's National Cyber Security Centre has issued a strong warning regarding a series of denial-of-service (DDoS) attacks targeting British organizations. This phenomenon has not gone unnoticed by authorities, who...

GitLab Security Update Fixes Critical Vulnerabilities CVE-2026-0723

An urgent security update has been released by GitLab for the Community (CE) and Enterprise (EE) editions to address several high-severity vulnerabilities. These vulnerabilities expose installations to potential denial-of-service (DoS)...

Critical Telnetd Vulnerability in GNU InetUtils Allows Root Access

A critical security flaw has been discovered in the telnetd server component of GNU InetUtils, involving remote authentication bypass . A security researcher reported the vulnerability on January 19, 2026....

Red Hot Cyber and Hack The Box: together for the CTF at the RHC 2026 conference

In the Italian and European cybersecurity landscape, few collaborations manage to combine educational vision, technical realism, and community impact as effectively as the partnership announced between Red Hot Cyber and...

Everest Ransomware Attacks McDonald’s, 861GB Data Stolen

Yesterday, the Everest cybercriminal gang claimed responsibility for a cyberattack on McDonald's on their Data Leak Site (DLS) . From the gang's post, the cybercriminals claim to have 861GB of...

ESXi Zero-Day Exploit: How to Protect Your VMware Environment

A group of attackers is using a zero-day exploit toolkit to compromise VMware ESXi instances in an uncontrolled manner, taking advantage of multiple vulnerabilities to bypass virtual machine restrictions. The...

VoidLink Malware: AI-Generated Threat for Linux Systems

We had already talked about VoidLink a few days ago , it is a framework composed of over 30 modules that can be combined to meet specific attacker objectives on...

Google Fast Pair Vulnerability: WhisperPair Exposes Millions of Devices

Researchers from the Cybersecurity and Industrial Cryptography team at KU Leuven have discovered a critical flaw in the Google Fast Pair protocol. The vulnerability allows attackers to hijack control of...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE