Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
HackTheBox 970x120 1

Red Hot Cyber – News and insights on cybercrime and cybersecurity

Precedente Successivo

Ultime news

Your MFA is no longer enough: Phishing kits bypass multi-factor authentication Cyber News

Your MFA is no longer enough: Phishing kits bypass multi-factor authentication

The amount of PhaaS kit has doubled since last year, according to an analysis by Barracuda Networks, placing increased pressure...
Redazione RHC - 23 January 2026
Nearly 2,000 bugs in 100 dating apps: How your data can be stolen Cyber News

Nearly 2,000 bugs in 100 dating apps: How your data can be stolen

A study of 100 dating apps revealed a disturbing picture: nearly 2,000 vulnerabilities were detected, 17% of which were classified...
Agostino Pellegrino - 23 January 2026
MacSync: The macOS malware that empties your wallet… after weeks Cyber News

MacSync: The macOS malware that empties your wallet… after weeks

A new malware campaign has emerged in the macOS world, one that relies not on sophisticated exploits, but on good...
Massimiliano Brolli - 23 January 2026
He arrived in America with $200 and ended up in a reformatory: today he controls 90% of the world’s AI innovation

He arrived in America with $200 and ended up in a reformatory: today he controls 90% of the world’s AI

How three insiders with just $200 in their pockets reached a market capitalization of $5 trillion and created the company...
Carlo Denza - 23 January 2026
The Thin Red Line of Criminal Liability in Cybersecurity Culture

The Thin Red Line of Criminal Liability in Cybersecurity

This article is the first in a series of three articles exploring the delicate relationship between cybersecurity professionals and the...
Paolo Galdieri - 23 January 2026
China Bans Western Cybersecurity Software, Cites Security Fears Cyber News

China Bans Western Cybersecurity Software, Cites Security Fears

Chinese authorities have begun quietly eliminating Western solutions from corporate networks in the country. According to Reuters sources, Chinese companies...
Agostino Pellegrino - 22 January 2026

Your paycheck is zero! Congratulations, someone answered the phone wrong

No worker would accept their paycheck disappearing without explanation. It was precisely from a series of internal reports of this nature that an organization began investigating an apparently administrative anomaly,...

Two Ukrainians Suspected in Black Basta Ransomware Attacks

When it comes to cybersecurity, it's not uncommon to come across news stories that seem straight out of a science fiction movie. Yet, the reality is even more surprising and...

From Zero-Day Exploits to Hidden Tunnels: How UAT-8837 Operates

Since early 2025, Cisco Talos specialists have detected the activity of the UAT-8837 group, which they attribute to China based on techniques and infrastructure similar to other well-known operators in...

Gootloader Malware Returns with Enhanced Evasion Techniques

After a long period of silence, the Gootloader downloader malware has returned to the forefront. Last November, the Huntress team detected a new campaign signaling the return of a developer...

US Considers Ramping Up Cyber Offensive Ops to Counter China Threats

U.S. authorities are actively discussing the need to strengthen offensive cyber activities in the face of ongoing attacks on the country's critical infrastructure . During a hearing of the House...

French Police Cyberattack Exposed: Weak Passwords Led to Data Breach

During a hearing in the French Senate, Interior Minister Laurent Nuñez detailed the details of the cyberattack that hit his ministry, immediately clarifying that some of the information remains covered...

Cisco Zero-Day Vulnerability Exploited: Secure Email Gateway Under Attack

Cisco has confirmed that a critical zero-day security flaw, allowing remote code execution, is currently being actively exploited in its Secure Email Gateway and Secure Email and Web Manager devices....

AWS CodeBuild Vulnerability Exposed: CodeBreach Threat Revealed

Security researchers at Wiz have discovered a critical vulnerability in the AWS CodeBuild service that could allow an attacker to take complete control of Amazon's GitHub repositories and potentially compromise...

Microsoft Patches Zero-Day NTFS Vulnerabilities in Windows 11 and Server

Microsoft released a security update in January that addresses two serious zero-day vulnerabilities in the NTFS file system. The vulnerabilities affected more than thirty versions of desktop and server operating...

AVCheck Malware Service Shut Down: Dutch Man Arrested for Cybercrime

Law enforcement has announced the arrest of a 33-year-old Dutch citizen on suspicion of operating the AVCheck platform, an online anti-malware testing service that was shut down last May during...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Beware of “I am not a robot”: the malware trap that uses Google Calendar.
Bajram Zeqiri - 29/01/2026

A new threat is lurking, exploiting our greatest weakness: habit. How many times, in fact, do you find yourself clicking on verification boxes without thinking twice? Now, it seems that malicious people have created a…

Immagine del sitoCybercrime
A blow to the heart of cybercrime: RAMP taken offline. The “temple” of ransomware falls!
Bajram Zeqiri - 28/01/2026

The RAMP (Russian Anonymous Marketplace) forum, one of the main hubs of the international cybercrime underground, has been officially shut down and seized by US law enforcement . The news emerged after the domain associated…

Immagine del sitoCyberpolitics
Digital Autonomy: France Says Goodbye to Teams and Zoom by 2027
Silvia Felici - 28/01/2026

This isn’t the first initiative to emerge on this front recently. Indeed, we’ve heard several of them, one after the other. And it’s almost inevitable: technological autonomy and national security are becoming an increasingly popular…

Immagine del sitoCyber News
And let the phishing begin! Microsoft is taking action against a zero-day exploit already exploited in Office
Pietro Melillo - 27/01/2026

Once again, Microsoft was forced to quickly fix some flaws. The company has released unscheduled patches for Microsoft Office, addressing a dangerous zero-day vulnerability that has already been exploited in cyberattacks. The issue, identified as…

Immagine del sitoCyber News
ServiceNow Under Attack: How an Email Can Open the Doors to Your Business
Redazione RHC - 27/01/2026

The recent discovery of a vulnerability in ServiceNow’s AI platform has shaken the cybersecurity industry. This flaw, characterized by an extremely high severity score, allowed unauthenticated attackers to impersonate any corporate user. To launch the…