Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
320x100 Olympous
970x120 Enterprise 1

Red Hot Cyber. The Cybersecurity Blog

Precedente Successivo

Ultime news

Beware of WhatsApp groups: An image can compromise your smartphone. Cyber News

Beware of WhatsApp groups: An image can compromise your smartphone.

WhatsApp is going through a very turbulent period. While many users still consider Meta's app a standard for mass messaging...
Redazione RHC - 27 January 2026
Linux: A “ghost” kernel bug discovered that had been lurking since 2020! Cyber News

Linux: A “ghost” kernel bug discovered that had been lurking since 2020!

A significant vulnerability has been discovered in the Linux kernel, hidden for years in one of the most critical architectural...
Agostino Pellegrino - 27 January 2026
Ransomware doesn’t lock servers, it locks credit. The financial side of cybersecurity Culture

Ransomware doesn’t lock servers, it locks credit. The financial side of cybersecurity

There's this mistaken—somewhat romantic, if you will—idea that ransomware is "IT stuff": a few servers in trouble, a couple of...
Antonio Piovesan - 27 January 2026
AI Isn’t as Reliable as You Think: The Hidden Risks of LLMs Without Good Governance innovation

AI Isn’t as Reliable as You Think: The Hidden Risks of LLMs Without Good Governance

Adopting large language models (LLMs) without adequate governance, verification, and oversight risks legal, financial, and reputational damage. This data emerges...
Silvia Felici - 27 January 2026
Active Defense and Hackback: The Legal Labyrinth of Cybersecurity Culture

Active Defense and Hackback: The Legal Labyrinth of Cybersecurity

In our previous article, we explored how the cybersecurity professional's role as guarantor clashes with classic scenarios such as unauthorized...
Paolo Galdieri - 27 January 2026
And let the phishing begin! Microsoft is taking action against a zero-day exploit already exploited in Office Cyber News

And let the phishing begin! Microsoft is taking action against a zero-day exploit already exploited in Office

Once again, Microsoft was forced to quickly fix some flaws. The company has released unscheduled patches for Microsoft Office, addressing...
Redazione RHC - 27 January 2026

Beware of WhatsApp groups: An image can compromise your smartphone.

WhatsApp is going through a very turbulent period. While many users still consider Meta's app a standard for mass messaging , the general sentiment is shifting toward forced necessity rather...

Linux: A “ghost” kernel bug discovered that had been lurking since 2020!

A significant vulnerability has been discovered in the Linux kernel, hidden for years in one of the most critical architectural components of the system : the x86 page fault handling...

Ransomware doesn’t lock servers, it locks credit. The financial side of cybersecurity

There's this mistaken—somewhat romantic, if you will—idea that ransomware is "IT stuff": a few servers in trouble, a couple of sleepless nights, then you restart and it's over… The reality,...

AI Isn’t as Reliable as You Think: The Hidden Risks of LLMs Without Good Governance

Adopting large language models (LLMs) without adequate governance, verification, and oversight risks legal, financial, and reputational damage. This data emerges from the report "Risks of Unmanaged AI Reliance: Evaluating Regional...

Active Defense and Hackback: The Legal Labyrinth of Cybersecurity

In our previous article, we explored how the cybersecurity professional's role as guarantor clashes with classic scenarios such as unauthorized access. However, in my professional and academic experience, I often...

And let the phishing begin! Microsoft is taking action against a zero-day exploit already exploited in Office

Once again, Microsoft was forced to quickly fix some flaws. The company has released unscheduled patches for Microsoft Office, addressing a dangerous zero-day vulnerability that has already been exploited in...

ServiceNow Under Attack: How an Email Can Open the Doors to Your Business

The recent discovery of a vulnerability in ServiceNow’s AI platform has shaken the cybersecurity industry. This flaw, characterized by an extremely high severity score, allowed unauthenticated attackers to impersonate any...

33,000 tons of iron… and an investigation where AIS and logs are cyber intelligence traps

A recent operation in the port of Brindisi, conducted by the Guardia di Finanza in collaboration with the Customs and Monopolies Agency (ADM) and coordinated by the Brindisi Public Prosecutor's...

149 Million Accounts Exposed: The Database No One Should Have Seen

A recent leak revealed 149 million logins and passwords exposed online , including accounts for financial services, social media, gaming, and dating sites. The discovery was made by researcher Jeremiah...

Shocking Discovery on Instagram: Private Posts Accessible Without Login!

The discovery was made by chance: while browsing the mobile web version of Instagram, Jatin Banga noticed that the contents of some private profiles were visible without any authorization. By...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCyber News
And let the phishing begin! Microsoft is taking action against a zero-day exploit already exploited in Office
Redazione RHC - 27/01/2026

Once again, Microsoft was forced to quickly fix some flaws. The company has released unscheduled patches for Microsoft Office, addressing a dangerous zero-day vulnerability that has already been exploited in cyberattacks. The issue, identified as…

Immagine del sitoCyber News
ServiceNow Under Attack: How an Email Can Open the Doors to Your Business
Redazione RHC - 27/01/2026

The recent discovery of a vulnerability in ServiceNow’s AI platform has shaken the cybersecurity industry. This flaw, characterized by an extremely high severity score, allowed unauthenticated attackers to impersonate any corporate user. To launch the…

Immagine del sitoCybercrime
149 Million Accounts Exposed: The Database No One Should Have Seen
Redazione RHC - 26/01/2026

A recent leak revealed 149 million logins and passwords exposed online , including accounts for financial services, social media, gaming, and dating sites. The discovery was made by researcher Jeremiah Fowler and shared with ExpressVPN.…

Immagine del sitoCybercrime
When Malware Hides in Videos! The PixelCode Technique Breaks the Rules
Marcello Filacchioni - 26/01/2026

PixelCode began as a research project exploring a hidden technique for storing binary data within images or videos . Instead of leaving a plaintext executable, the file is converted into pixel data, transforming each byte…

Immagine del sitoCyber News
How a simple Visual Studio Code file can become a backdoor for state-run hackers
Redazione RHC - 26/01/2026

Security researchers have recently observed a worrying evolution in the offensive tactics attributed to North Korean-linked actors as part of the campaign known as Contagious Interview : no longer simple fake job interview scams, but…