Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Cyber Offensive Fundamentals 320x200 V0.1
Cyber Offensive Fundamentals 970x120 V0.1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Microsoft Copilot Vulnerability Exposes User Data to Hackers Cybercrime

Microsoft Copilot Vulnerability Exposes User Data to Hackers

A recently fixed vulnerability allowed attackers to exploit Microsoft Copilot Personal with a single click to steal sensitive user data....
Redazione RHC - 15 January 2026
Progress Software Patches LoadMaster, MOVEit WAF Vulnerabilities Cybercrime

Progress Software Patches LoadMaster, MOVEit WAF Vulnerabilities

On January 12, 2026, Progress Software Corporation released patches that address two high-severity Command Injection vulnerabilities, which could allow remote...
Redazione RHC - 15 January 2026
Fortinet FortiSIEM Vulnerability CVE-2025-64155: Critical Security Update Cybercrime

Fortinet FortiSIEM Vulnerability CVE-2025-64155: Critical Security Update

A critical security flaw was recently patched by Fortinet through update releases, which significantly impacted FortiSIEM . An unauthenticated attacker...
Redazione RHC - 15 January 2026
ARM: The Future of Low-Power Computing and AI Cybercrime

ARM: The Future of Low-Power Computing and AI

Just look around and you'll almost certainly find a device nearby that uses a processor based on the same design:...
Redazione RHC - 15 January 2026
24-Year-Old Hacker Breaches US Supreme Court Database Cybercrime

24-Year-Old Hacker Breaches US Supreme Court Database

Do you remember the 24-year-old hacker Carmelo Miano and the breaches of the Naples Prosecutor's Office's accounts and computer systems?...
Redazione RHC - 14 January 2026
Cyberattack Hits Belgian Hospital AZ Monica, Ransomware Used Cybercrime

Cyberattack Hits Belgian Hospital AZ Monica, Ransomware Used

In the early morning hours of January 13, one of Belgium's leading hospitals suddenly found itself nearly paralyzed. AZ Monica,...
Redazione RHC - 14 January 2026

Internet Shutdowns Cost $19.7B in 2025, Sophisticated Censorship Rises

Imagine a situation where the internet appears to be working, but websites won't open beyond the first screen, messaging apps are intermittent, and businesses are constantly changing. According to the...
Share on Facebook Share on LinkedIn Share on X

Doom on a Smart Pressure Cooker: The Ultimate IoT Hack

The line between home appliances and gaming consoles continues to blur. The latest frontier of " extreme porting" features the Krups Cook4Me Connect , a smart pressure cooker that's been...
Share on Facebook Share on LinkedIn Share on X

LockBit 5.0 Ransomware: The Evolving Threat

Cybercrime continues to reinvent itself, and LockBit is one of the most prominent examples. Active since late 2019, the group has become one of the most prolific ransomware operators ever...
Share on Facebook Share on LinkedIn Share on X

Instagram Data Leak Exposes 17.5 Million Users on Dark Web

A massive digital archive containing the private information of approximately 17.5 million Instagram users appears to have fallen into the hands of cybercriminals. A few hours ago, the alarm was...
Share on Facebook Share on LinkedIn Share on X

Phishing Emails Mimic Internal Comms via Microsoft 365 Spoofing

Phishing attacks are becoming increasingly insidious, to the point of perfectly mimicking internal corporate communications . This is the alarm raised by Microsoft, which has observed a significant increase in...
Share on Facebook Share on LinkedIn Share on X

Lovense Emily AI Doll: Revolutionary Companion at CES 2026

At CES 2026 in Las Vegas, Lovense , known for its app-controlled smart toys for adults , decided to make a bold statement in a completely different format . Instead...
Share on Facebook Share on LinkedIn Share on X

HPE OneView Critical Vulnerability Exploited: Update Now to Prevent Attacks

The Cybersecurity and Infrastructure Security Agency (CISA) of the United States of America has raised the alarm about the active exploitation of a critical vulnerability in HPE OneView , an...
Share on Facebook Share on LinkedIn Share on X

Undertow Vulnerability CVE-2025-12543 Exposes Java Ecosystem to Critical Security Risks

A flaw has been discovered in the foundation of the Java web ecosystem. Undertow , the high-performance web server that powers enterprise heavyweights like WildFly and JBoss EAP , has...
Share on Facebook Share on LinkedIn Share on X

The Revolutionary iPhone Launch: A Game-Changing Moment in Tech History

San Francisco: January 9, 2007 There was something strange about the air, like when you know something's about to happen but you don't know what. Steve Jobs was on stage...
Share on Facebook Share on LinkedIn Share on X

Cloudflare Hit with €14M Fine for Failing to Block Pirate Content

The Italian Communications Regulatory Authority (AGCOM) has imposed an administrative fine exceeding €14 million on Cloudflare Inc. for failure to comply with Italian legislation against online piracy. The measure was...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Nearly 2,000 bugs in 100 dating apps: How your data can be stolen
Redazione RHC - 23/01/2026

A study of 100 dating apps revealed a disturbing picture: nearly 2,000 vulnerabilities were detected, 17% of which were classified as critical. The analysis was conducted by AppSec Solutions. The study’s results were published by…

Immagine del sitoCybercrime
MacSync: The macOS malware that empties your wallet… after weeks
Redazione RHC - 23/01/2026

A new malware campaign has emerged in the macOS world, one that relies not on sophisticated exploits, but on good old-fashioned social engineering. It’s powered by the MacSync malware, distributed using the ” malware-as-a-service ”…

Immagine del sitoCybercrime
Larva-25012 Proxyjacking Campaign Targets South Korea with Notepad++ Malware
Redazione RHC - 22/01/2026

A sophisticated proxyjacking campaign is targeting systems in South Korea, attributed to the actor Larva-25012 , which distributes proxyware disguised as legitimate Notepad++ installers. The campaign demonstrates significant technical evolution, using process injection in explorer.exe…

Immagine del sitoCybercrime
PurpleBravo’s Contagious Interview: Malware Campaign Targets Global Firms
Redazione RHC - 22/01/2026

For over a year, the North Korean group PurpleBravo has been running a targeted malware campaign called “Contagious Interview,” using fake job interviews to attack companies in Europe, Asia, the Middle East, and Central America.…

Immagine del sitoCybercrime
KONNI Malware Targets Crypto Developers with AI-Powered Attacks
Redazione RHC - 22/01/2026

Check Point Research recently discovered a sophisticated phishing campaign orchestrated by KONNI , a threat group linked to North Korea . Historically focused on diplomatic targets in South Korea, the malicious actor has now expanded…