Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
UtiliaCS 320x100
Banner Ransomfeed 970x120 1

Red Hot Cyber – News and insights on cybercrime and cybersecurity

Precedente Successivo

Ultime news

Vulnerabilities discovered in Foxit PDF Editor, Epic Games Store, and MedDream PACS Cyber News

Vulnerabilities discovered in Foxit PDF Editor, Epic Games Store, and MedDream PACS

Recently, the Cisco Talos vulnerability research and discovery team identified a number of vulnerabilities in various software. Specifically, three vulnerabilities...
Massimiliano Brolli - 22 January 2026
Larva-25012 Proxyjacking Campaign Targets South Korea with Notepad++ Malware Cyber News

Larva-25012 Proxyjacking Campaign Targets South Korea with Notepad++ Malware

A sophisticated proxyjacking campaign is targeting systems in South Korea, attributed to the actor Larva-25012 , which distributes proxyware disguised...
Redazione RHC - 22 January 2026
OpenAI API Logs Vulnerability Exposed: Data Exfiltration Risk Cyber News

OpenAI API Logs Vulnerability Exposed: Data Exfiltration Risk

Imagine your chatbot worked properly and didn't display a malicious response to the user. But a leak still occurred later,...
Redazione RHC - 22 January 2026
PurpleBravo’s Contagious Interview: Malware Campaign Targets Global Firms Cyber News

PurpleBravo’s Contagious Interview: Malware Campaign Targets Global Firms

For over a year, the North Korean group PurpleBravo has been running a targeted malware campaign called “Contagious Interview,” using...
Sandro Sana - 22 January 2026
KONNI Malware Targets Crypto Developers with AI-Powered Attacks Cyber News

KONNI Malware Targets Crypto Developers with AI-Powered Attacks

Check Point Research recently discovered a sophisticated phishing campaign orchestrated by KONNI , a threat group linked to North Korea...
Stefano Gazzella - 22 January 2026
LastPass Phishing Attack: Protect Your Master Password Now Cyber News

LastPass Phishing Attack: Protect Your Master Password Now

On January 21, 2026, LastPass warned its users about a new and active phishing campaign aimed at stealing customers' master...
Redazione RHC - 22 January 2026

Cisco Zero-Day Vulnerability Exploited: Secure Email Gateway Under Attack

Cisco has confirmed that a critical zero-day security flaw, allowing remote code execution, is currently being actively exploited in its Secure Email Gateway and Secure Email and Web Manager devices....

AWS CodeBuild Vulnerability Exposed: CodeBreach Threat Revealed

Security researchers at Wiz have discovered a critical vulnerability in the AWS CodeBuild service that could allow an attacker to take complete control of Amazon's GitHub repositories and potentially compromise...

Microsoft Patches Zero-Day NTFS Vulnerabilities in Windows 11 and Server

Microsoft released a security update in January that addresses two serious zero-day vulnerabilities in the NTFS file system. The vulnerabilities affected more than thirty versions of desktop and server operating...

AVCheck Malware Service Shut Down: Dutch Man Arrested for Cybercrime

Law enforcement has announced the arrest of a 33-year-old Dutch citizen on suspicion of operating the AVCheck platform, an online anti-malware testing service that was shut down last May during...

VoidLink Malware: Advanced Linux Framework Targets Cloud Infrastructures

Check Point researchers have discovered a new Linux infection framework distinguished by its advanced modular architecture and wide range of features. The malware has been dubbed VoidLink . The framework...

Microsoft Ends Support for Windows Server 2008: What It Means

This week marked the end of an era: Microsoft finally ended support for Windows Server 2008 , the operating system based on Windows Vista. The server operating system, codenamed Longhorn...

The AI Energy Crisis: How Data Centers Are Reshaping US Power Costs

The accelerated growth of artificial intelligence is bringing with it an increasingly obvious consequence : rising energy demand. This issue entered the US political debate forcefully on January 13, when...

Microsoft Copilot Vulnerability Exposes User Data to Hackers

A recently fixed vulnerability allowed attackers to exploit Microsoft Copilot Personal with a single click to steal sensitive user data. Using a phishing link, attackers were able to take control...

Progress Software Patches LoadMaster, MOVEit WAF Vulnerabilities

On January 12, 2026, Progress Software Corporation released patches that address two high-severity Command Injection vulnerabilities, which could allow remote attackers to execute malicious code on LoadMaster load balancers and...

Fortinet FortiSIEM Vulnerability CVE-2025-64155: Critical Security Update

A critical security flaw was recently patched by Fortinet through update releases, which significantly impacted FortiSIEM . An unauthenticated attacker could have exploited this weakness to execute arbitrary code on...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
A blow to the heart of cybercrime: RAMP taken offline. The “temple” of ransomware falls!
Bajram Zeqiri - 28/01/2026

The RAMP (Russian Anonymous Marketplace) forum, one of the main hubs of the international cybercrime underground, has been officially shut down and seized by US law enforcement . The news emerged after the domain associated…

Immagine del sitoCyberpolitics
Digital Autonomy: France Says Goodbye to Teams and Zoom by 2027
Silvia Felici - 28/01/2026

This isn’t the first initiative to emerge on this front recently. Indeed, we’ve heard several of them, one after the other. And it’s almost inevitable: technological autonomy and national security are becoming an increasingly popular…

Immagine del sitoCyber News
And let the phishing begin! Microsoft is taking action against a zero-day exploit already exploited in Office
Pietro Melillo - 27/01/2026

Once again, Microsoft was forced to quickly fix some flaws. The company has released unscheduled patches for Microsoft Office, addressing a dangerous zero-day vulnerability that has already been exploited in cyberattacks. The issue, identified as…

Immagine del sitoCyber News
ServiceNow Under Attack: How an Email Can Open the Doors to Your Business
Redazione RHC - 27/01/2026

The recent discovery of a vulnerability in ServiceNow’s AI platform has shaken the cybersecurity industry. This flaw, characterized by an extremely high severity score, allowed unauthenticated attackers to impersonate any corporate user. To launch the…

Immagine del sitoCybercrime
149 Million Accounts Exposed: The Database No One Should Have Seen
Redazione RHC - 26/01/2026

A recent leak revealed 149 million logins and passwords exposed online , including accounts for financial services, social media, gaming, and dating sites. The discovery was made by researcher Jeremiah Fowler and shared with ExpressVPN.…