Red Hot Cyber
Cybersecurity, Cybercrime News and Vulnerability Analysis
UtiliaCS 970x120

Author: Redazione RHC

Redazione RHC

The Red Hot Cyber Editorial Team provides daily updates on bugs, data breaches, and global threats. Every piece of content is validated by our community of experts, including Pietro Melillo, Massimiliano Brolli, Sandro Sana, Olivia Terragni, and Stefano Gazzella.

Through synergy with our industry-leading partners—such as Accenture, CrowdStrike, Trend Micro, and Fortinet—we transform technical complexity into collective awareness. We ensure information accuracy by analyzing primary sources and maintaining a rigorous technical peer-review process.

Numero di articoli trovati: 377

Ivanti Takes Action: Zero-Day Flaws Affect Mobile Endpoint Manager

Ivanti has released a series of critical updates to address two security vulnerabilities affecting Ivanti Endpoint Manager Mobile (EPMM). These vulnerabilities are being actively exploited in zero-day attacks, prompting the...

Johnson Controls Score 10 Vulnerabilities: Smart Buildings Are at Risk

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a maximum severity alert regarding a security flaw affecting Johnson Controls, a global leader in smart building technology. This vulnerability, classified...

BitLocker Under Fire: Microsoft Admits Handing Over Encryption Keys to FBI

Digital security today faces a troubling crossroads that affects millions of Windows users worldwide. Microsoft BitLocker, the popular proprietary encryption mechanism, allows you to protect data on hard drives, but...

n8n Alert: Two critical RCE vulnerabilities discovered (CVE-2026-1470). Update now!

The n8n platform, a widely adopted open source software for orchestrating enterprise automation and workflows, was recently at the center of a new security alert: two vulnerabilities emerged in its...

ServiceNow Under Attack: How an Email Can Open the Doors to Your Business

The recent discovery of a vulnerability in ServiceNow’s AI platform has shaken the cybersecurity industry. This flaw, characterized by an extremely high severity score, allowed unauthenticated attackers to impersonate any...

Email Security Under Pressure: Phishing Kits to Double in 2025

According to Barracuda’s Phishing Report 2025 , the number of phishing-as-a-service (PhaaS) kits is expected to double by 2025, placing increasing pressure on security teams to combat an increasingly evolving...

How a simple Visual Studio Code file can become a backdoor for state-run hackers

Security researchers have recently observed a worrying evolution in the offensive tactics attributed to North Korean-linked actors as part of the campaign known as Contagious Interview : no longer simple...

Khaby Lame is selling the rights to his digital identity for $900 million. But there’s reason to think.

Khaby Lame, the world's most followed Italian creator and now a global social media icon, has taken a step that could mark a turning point in the history of the...

Microsoft Teams will know where you are: your geographic location will be inferred from your Wi-Fi

Microsoft is preparing to introduce an update that will transform a small manual habit into a system-wide automation. Soon, Microsoft Teams will be able to infer and display a user's...

A working browser built with AI using 3 million lines of code: breakthrough or illusion?

A week ago, Cursor CEO Michael Truell announced a supposedly remarkable achievement. He claimed that, using GPT-5.2, Cursor had created a browser capable of running continuously for an entire week....