Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
HackTheBox 320x100 1
Banner Ransomfeed 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

CVE-2026-21858: n8n Vulnerability Exposes Thousands of Servers to RCE Cybercrime

CVE-2026-21858: n8n Vulnerability Exposes Thousands of Servers to RCE

The vulnerability, identified as CVE-2026-21858, which we recently reported on, affects approximately 100,000 servers worldwide, threatening to expose proprietary API...
Redazione RHC - 8 January 2026
Malware PHALT#BLYX Uses Social Engineering and MSBuild to Infect Systems Cybercrime

Malware PHALT#BLYX Uses Social Engineering and MSBuild to Infect Systems

A cancellation message from Booking.com with a high penalty seems like a typical business practice for hotels and apartments. But...
Redazione RHC - 7 January 2026
Disable Windows 11 AI Features Easily with RemoveWindowsAI Tool Cybercrime

Disable Windows 11 AI Features Easily with RemoveWindowsAI Tool

A new open-source script allows Windows 11 users to widely disable the operating system's built-in artificial intelligence features . The...
Redazione RHC - 7 January 2026
DevSecOps: Integrating Security into Your Development Process Cybercrime

DevSecOps: Integrating Security into Your Development Process

When it comes to application security, there's rarely a single problem. It's almost always a chain of small flaws, poor...
Massimiliano Brolli - 7 January 2026
Critical RCE Vulnerability in D-Link DSL Routers – Update Now Cybercrime

Critical RCE Vulnerability in D-Link DSL Routers – Update Now

A critical remote code execution (RCE) flaw in older D-Link DSL routers has been identified as CVE-2026-0625, with a CVSS...
Redazione RHC - 7 January 2026
Critical n8n Vulnerability: Update Now to Prevent RCE Attacks Vulnerability

Critical n8n Vulnerability: Update Now to Prevent RCE Attacks

n8n, the “fair-code” workflow automation platform beloved by engineering teams for its combination of low-code speed and programming flexibility, has...
Redazione RHC - 7 January 2026

Long-Lived Technologies: COBOL, C, SQL, and Legacy Systems

While the industry debates which neural network is the “smartest” and which framework is the “most modern,” decades-old technologies continue to quietly swirl beneath the surface of the banking industry...
Share on Facebook Share on LinkedIn Share on X

PollyPolymer Revolutionizes Robotics with 3D Printed Flexible Components

When XPeng unveiled its new humanoid robot this year, the spectacle was designed to inspire disbelief. The robot's movements were so lifelike that company founder He Xiaopeng had to cut...
Share on Facebook Share on LinkedIn Share on X

GlassWorm Malware Targets macOS via Open VSX Extensions

A new wave of malicious extensions has been discovered in the Open VSX extension store, used by millions of developers. Koi experts warn that attackers are pushing "useful" plugins into...
Share on Facebook Share on LinkedIn Share on X

AI Job Losses: Geoffrey Hinton Warns of Widespread Unemployment by 2026

Computer science professor Geoffrey Hinton , one of the founders of modern artificial intelligence technologies, has claimed that AI could lead to large-scale job losses as early as 2026. According...
Share on Facebook Share on LinkedIn Share on X

NVIDIA Tegra X2 Vulnerability: Millions of Devices at Risk

At the 39th annual Chaos Communications Conference (39C3) , security researcher Amber Katze, 22, announced that she has completely analyzed and cracked the secure boot mechanism of the NVIDIA Tegra...
Share on Facebook Share on LinkedIn Share on X

China Regulates AI Chatbots with Human-like Interaction

Chatbots are everywhere now. We've all encountered those virtual assistants that answer our questions, provide us with information, and sometimes seem downright intelligent. But what happens when these chatbots become...
Share on Facebook Share on LinkedIn Share on X

The Dark Side of AI Rights: Why Experts Are Urging Caution

As artificial intelligence develops, the debate over its status and the limits of what is permissible is becoming increasingly heated. One of the most respected researchers in this field, Canadian...
Share on Facebook Share on LinkedIn Share on X

EU’s Child Sexual Abuse Regulation: Balancing Safety and Digital Rights

Before delving into the analysis, it is worth pointing out that this contribution is the first part of a more extensive research. In the next article, we will explore the...
Share on Facebook Share on LinkedIn Share on X

AI Systems Vulnerable to Attacks: Experts Warn of New Threats

At the recent Chaos Communication Congress in Germany, a new alarm was raised about the threats posed by artificial intelligence agents. According to cybersecurity specialist Johann Rehberger , a computer...
Share on Facebook Share on LinkedIn Share on X

China Boosts AI Education with New Strategy to Prepare Students for Digital Age

China's Ministry of Education has announced a structured strengthening of artificial intelligence education , differentiated according to different school levels, with the aim of preparing students with skills suited to...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
24-Year-Old Hacker Breaches US Supreme Court Database
Redazione RHC - 14/01/2026

Do you remember the 24-year-old hacker Carmelo Miano and the breaches of the Naples Prosecutor’s Office’s accounts and computer systems? It appears something similar happened in the United States, and the other young man is…

Immagine del sitoCybercrime
Cloudflare vs Italy: The Battle for Internet Freedom and DNS Control
Redazione RHC - 14/01/2026

Cloudflare CEO Matthew Prince has threatened to shut down the company’s operations in Italy after the country’s telecom regulator fined it twice its annual revenue in the country. The facts The conflict erupted around Italy’s…

Immagine del sitoCybercrime
Cybercrime Meets Real-Life Violence: Foxtrot Network’s Dark Side
Redazione RHC - 13/01/2026

In recent months, there has been increasing talk of a paradigm shift in cybercrime . What for years was perceived as a predominantly digital ecosystem— consisting of fraud, identity theft, online extortion, and cyberattacks —is…

Immagine del sitoCybercrime
Iran Cyber Crisis: Connettività Compromised
Roberto Villani - 13/01/2026

Sometimes important things don’t arrive at a press conference. They arrive like a graph that stops breathing: the connectivity line collapses, the OSINT dries up, the noise grows as the signal disappears. In Iran, the…

Vulnerability
ServiceNow AI Vulnerability CVE-2025-12420: Critical Security Risk
Redazione RHC - 13/01/2026

A critical flaw has been identified in ServiceNow’s artificial intelligence platform, with a severity score of 9.3 out of 10. This vulnerability, classified as CVE-2025-12420, could allow attackers to impersonate legitimate users without authenticating. ServiceNow…