Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Cyber Offensive Fundamentals 320x200 V0.1
970x20 Itcentric

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Two Ukrainians Suspected in Black Basta Ransomware Attacks Cyber crime

Two Ukrainians Suspected in Black Basta Ransomware Attacks

When it comes to cybersecurity, it's not uncommon to come across news stories that seem straight out of a science...
Pietro Melillo - 17 January 2026
From Zero-Day Exploits to Hidden Tunnels: How UAT-8837 Operates Cyber News

From Zero-Day Exploits to Hidden Tunnels: How UAT-8837 Operates

Since early 2025, Cisco Talos specialists have detected the activity of the UAT-8837 group, which they attribute to China based...
Agostino Pellegrino - 17 January 2026
Gootloader Malware Returns with Enhanced Evasion Techniques Cyber crime

Gootloader Malware Returns with Enhanced Evasion Techniques

After a long period of silence, the Gootloader downloader malware has returned to the forefront. Last November, the Huntress team...
Massimiliano Brolli - 17 January 2026
US Considers Ramping Up Cyber Offensive Ops to Counter China Threats Cyber News

US Considers Ramping Up Cyber Offensive Ops to Counter China Threats

U.S. authorities are actively discussing the need to strengthen offensive cyber activities in the face of ongoing attacks on the...
Agostino Pellegrino - 17 January 2026
French Police Cyberattack Exposed: Weak Passwords Led to Data Breach Cyber News

French Police Cyberattack Exposed: Weak Passwords Led to Data Breach

During a hearing in the French Senate, Interior Minister Laurent Nuñez detailed the details of the cyberattack that hit his...
Redazione RHC - 17 January 2026
Cisco Zero-Day Vulnerability Exploited: Secure Email Gateway Under Attack Vulnerability

Cisco Zero-Day Vulnerability Exploited: Secure Email Gateway Under Attack

Cisco has confirmed that a critical zero-day security flaw, allowing remote code execution, is currently being actively exploited in its...
Agostino Pellegrino - 16 January 2026

APT28 Phishing Campaign: Credential Harvesting Tactics

The threat actor APT28 , classified as an Advanced Persistent Threat, active since at least 2004, identified by the alias BlueDelta, but even better known under the name IRON TWILIGHT...

Iran Cyber Crisis: Connettività Compromised

Sometimes important things don't arrive at a press conference. They arrive like a graph that stops breathing: the connectivity line collapses, the OSINT dries up, the noise grows as the...

ServiceNow AI Vulnerability CVE-2025-12420: Critical Security Risk

A critical flaw has been identified in ServiceNow's artificial intelligence platform, with a severity score of 9.3 out of 10. This vulnerability, classified as CVE-2025-12420, could allow attackers to impersonate...

Microsoft Expands Global Network with New Undersea Fiber Optic Cables

In May 2015, Microsoft announced a series of strategic agreements to strengthen its global network infrastructure with new submarine fiber optic cables . This initiative is part of a broader...

Poisoning AI Data: The New Threat to Machine Learning Models

A bold new initiative has been launched in the artificial intelligence industry to weaken machine learning models by deliberately distorting the data used to train them. The project, called Poison...

Pig Butchering Scams Evolve with PBaaS: The New Threat

Online scams known as "pig butchering" are undergoing a profound transformation. From artisanal and disorganized operations , based on makeshift call centers, they have become a structured, scalable, and highly...

Apache Struts 2 Vulnerability CVE-2025-68493 Exposes Sensitive Data

A new flaw has emerged in the foundation of one of the most popular Java frameworks on the web. Cybersecurity experts at ZAST.AI have discovered a significant security flaw in...

CRISPR-Cas13: Breakthrough in Flu Treatment with Gene Editing

Influenza remains one of the most stubborn and unpleasant infections on the planet. It returns every winter, mutating, evading the immune system, and eventually becoming drug-resistant. Now, scientists are proposing...

Uncovering Dark AI: The Truth Behind Crime-as-a-Service Chatbots

In recent months, the cybersecurity landscape has been awash with media hype surrounding new AI Dark Chatbots promoted as "Crime-as-a-Service" services on Telegram and the Dark Web. These platforms are...

AI-Generated Mac Malware: SimpleStealth Threatens User Security

A group of industry specialists has identified for the first time a macOS malware whose code clearly shows signs of having been generated using artificial intelligence tools . The discovery,...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCyber News
CISA alert: Exploit underway against VMware vCenter. Risk of RCE without authentication.
Redazione RHC - 25/01/2026

The critical vulnerability recently added to the Cybersecurity and Infrastructure Security Agency (CISA) catalog of known exploited vulnerabilities (KEVs) affects the Broadcom VMware vCenter Server and is being actively exploited by malicious hackers to breach…

Immagine del sitoCyber News
“I Stole 120,000 Bitcoins”: The Confession of the Bitfinex Hacker Who Now Wants to Defend Cyberspace
Agostino Pellegrino - 25/01/2026

The story ofIlya Lichtenstein, the hacker responsible for one of the largest cyber attacks ever carried out against cryptocurrencies, reads like an episode of a TV series, yet it is absolutely real. After being released,…

Immagine del sitoCyber News
NoName057(16) hits Italy 487 times in the last 3 months: the DDoS wave does not stop
Redazione RHC - 24/01/2026

Italy has confirmed itself as one of the main targets of the DDoS attack campaign carried out by the hacktivist group NoName057(16) . According to what was declared directly by the collective, our country has…

Immagine del sitoCyber News
NexPhone: Three operating systems in your pocket! The phone that challenges the very concept of a PC.
Redazione RHC - 23/01/2026

The question has been circulating for over ten years: can a smartphone really replace a computer? Over time, the industry has repeatedly attempted to provide a concrete answer, without ever reaching a definitive solution. From…

Immagine del sitoCyber News
BlueNoroff: The Hacker Group Revolutionizing Cybercrime
Redazione RHC - 23/01/2026

The BlueNoroff hacker group has long since transformed cybercrime into a high-tech business, with tens of millions of dollars, cryptocurrency assets, and entire financial ecosystems at stake. A report by Picus Security details the group’s…