Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Cyber Offensive Fundamentals 320x200 V0.1
Banner Desktop

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

French Police Cyberattack Exposed: Weak Passwords Led to Data Breach Cyber News

French Police Cyberattack Exposed: Weak Passwords Led to Data Breach

During a hearing in the French Senate, Interior Minister Laurent Nuñez detailed the details of the cyberattack that hit his...
Redazione RHC - 17 January 2026
Cisco Zero-Day Vulnerability Exploited: Secure Email Gateway Under Attack Vulnerability

Cisco Zero-Day Vulnerability Exploited: Secure Email Gateway Under Attack

Cisco has confirmed that a critical zero-day security flaw, allowing remote code execution, is currently being actively exploited in its...
Agostino Pellegrino - 16 January 2026
AWS CodeBuild Vulnerability Exposed: CodeBreach Threat Revealed Cyber News

AWS CodeBuild Vulnerability Exposed: CodeBreach Threat Revealed

Security researchers at Wiz have discovered a critical vulnerability in the AWS CodeBuild service that could allow an attacker to...
Redazione RHC - 16 January 2026
Microsoft Patches Zero-Day NTFS Vulnerabilities in Windows 11 and Server Cyber News

Microsoft Patches Zero-Day NTFS Vulnerabilities in Windows 11 and Server

Microsoft released a security update in January that addresses two serious zero-day vulnerabilities in the NTFS file system. The vulnerabilities...
Redazione RHC - 16 January 2026
AVCheck Malware Service Shut Down: Dutch Man Arrested for Cybercrime Cyber News

AVCheck Malware Service Shut Down: Dutch Man Arrested for Cybercrime

Law enforcement has announced the arrest of a 33-year-old Dutch citizen on suspicion of operating the AVCheck platform, an online...
Redazione RHC - 16 January 2026
VoidLink Malware: Advanced Linux Framework Targets Cloud Infrastructures Cyber News

VoidLink Malware: Advanced Linux Framework Targets Cloud Infrastructures

Check Point researchers have discovered a new Linux infection framework distinguished by its advanced modular architecture and wide range of...
Redazione RHC - 16 January 2026

Poisoning AI Data: The New Threat to Machine Learning Models

A bold new initiative has been launched in the artificial intelligence industry to weaken machine learning models by deliberately distorting the data used to train them. The project, called Poison...
Share on Facebook Share on LinkedIn Share on X

Pig Butchering Scams Evolve with PBaaS: The New Threat

Online scams known as "pig butchering" are undergoing a profound transformation. From artisanal and disorganized operations , based on makeshift call centers, they have become a structured, scalable, and highly...
Share on Facebook Share on LinkedIn Share on X

Apache Struts 2 Vulnerability CVE-2025-68493 Exposes Sensitive Data

A new flaw has emerged in the foundation of one of the most popular Java frameworks on the web. Cybersecurity experts at ZAST.AI have discovered a significant security flaw in...
Share on Facebook Share on LinkedIn Share on X

CRISPR-Cas13: Breakthrough in Flu Treatment with Gene Editing

Influenza remains one of the most stubborn and unpleasant infections on the planet. It returns every winter, mutating, evading the immune system, and eventually becoming drug-resistant. Now, scientists are proposing...
Share on Facebook Share on LinkedIn Share on X

Uncovering Dark AI: The Truth Behind Crime-as-a-Service Chatbots

In recent months, the cybersecurity landscape has been awash with media hype surrounding new AI Dark Chatbots promoted as "Crime-as-a-Service" services on Telegram and the Dark Web. These platforms are...
Share on Facebook Share on LinkedIn Share on X

AI-Generated Mac Malware: SimpleStealth Threatens User Security

A group of industry specialists has identified for the first time a macOS malware whose code clearly shows signs of having been generated using artificial intelligence tools . The discovery,...
Share on Facebook Share on LinkedIn Share on X

Linus Torvalds on AI Coding: ‘It’s Just Another Tool’

Linus Torvalds, the creator of Linux, has expressed a firm and uncompromising position regarding the debate over the integration and use of artificial intelligence tools in writing and reviewing Linux...
Share on Facebook Share on LinkedIn Share on X

The Future of Tech: Sovereignty, Security, and Cloud Control

In today's world, technology is no longer a mere tool for efficiency or convenience, but a primary geopolitical lever . Access to digital infrastructure, cloud platforms, and communications systems isn't...
Share on Facebook Share on LinkedIn Share on X

Internet Shutdowns Cost $19.7B in 2025, Sophisticated Censorship Rises

Imagine a situation where the internet appears to be working, but websites won't open beyond the first screen, messaging apps are intermittent, and businesses are constantly changing. According to the...
Share on Facebook Share on LinkedIn Share on X

Doom on a Smart Pressure Cooker: The Ultimate IoT Hack

The line between home appliances and gaming consoles continues to blur. The latest frontier of " extreme porting" features the Krups Cook4Me Connect , a smart pressure cooker that's been...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCyber News
NoName057(16) hits Italy 487 times in the last 3 months: the DDoS wave does not stop
Redazione RHC - 24/01/2026

Italy has confirmed itself as one of the main targets of the DDoS attack campaign carried out by the hacktivist group NoName057(16) . According to what was declared directly by the collective, our country has…

Immagine del sitoCyber News
NexPhone: Three operating systems in your pocket! The phone that challenges the very concept of a PC.
Redazione RHC - 23/01/2026

The question has been circulating for over ten years: can a smartphone really replace a computer? Over time, the industry has repeatedly attempted to provide a concrete answer, without ever reaching a definitive solution. From…

Immagine del sitoCyber News
BlueNoroff: The Hacker Group Revolutionizing Cybercrime
Redazione RHC - 23/01/2026

The BlueNoroff hacker group has long since transformed cybercrime into a high-tech business, with tens of millions of dollars, cryptocurrency assets, and entire financial ecosystems at stake. A report by Picus Security details the group’s…

Immagine del sitoCyber News
Nearly 2,000 bugs in 100 dating apps: How your data can be stolen
Redazione RHC - 23/01/2026

A study of 100 dating apps revealed a disturbing picture: nearly 2,000 vulnerabilities were detected, 17% of which were classified as critical. The analysis was conducted by AppSec Solutions. The study’s results were published by…

Immagine del sitoCyber News
MacSync: The macOS malware that empties your wallet… after weeks
Redazione RHC - 23/01/2026

A new malware campaign has emerged in the macOS world, one that relies not on sophisticated exploits, but on good old-fashioned social engineering. It’s powered by the MacSync malware, distributed using the ” malware-as-a-service ”…