Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

HackTheBox 970x120 1
Precedente Successivo

Latest news

What if the US shut down the cloud tomorrow? The EU has no plan and legislates with little thought. Cyberpolitics

What if the US shut down the cloud tomorrow? The EU has no plan and legislates with little thought.

As the cloud becomes the heart of the digital economy, the European Union faces a historic choice: whether to transform...
Marcello Filacchioni - February 2, 2026
Goodbye to NTLM! Microsoft is moving towards a new era of authentication with Kerberos Cyber News

Goodbye to NTLM! Microsoft is moving towards a new era of authentication with Kerberos

For over three decades, it has been a silent pillar of the Windows ecosystem. Now, however, NTLM 's time seems...
Silvia Felici - February 1, 2026
Penetration testing tools are evolving: open source enters a new phase innovation

Penetration testing tools are evolving: open source enters a new phase

In recent months, the penetration testing landscape has been undergoing a profound and accelerated transformation. So-called agentic tools , i.e.,...
Massimiliano Brolli - January 31, 2026
SCADA Systems at Risk: Why File System Security Matters More Than Ever Vulnerability

SCADA Systems at Risk: Why File System Security Matters More Than Ever

SCADA system security requires rigorous management of processes operating with elevated privileges. A recent technical analysis has examined the CVE-2025-0921...
Carolina Vivianti - January 31, 2026
Critical vulnerability in Apache bRPC: Arbitrary command execution on the server Cyber News

Critical vulnerability in Apache bRPC: Arbitrary command execution on the server

A CyberArk Labs research team has identified a critical flaw in the widely used Apache bRPC framework, which allows remote...
Bajram Zeqiri - January 31, 2026
The world’s first humanoid robot store has opened in China. Will we be ready? innovation

The world’s first humanoid robot store has opened in China. Will we be ready?

At ten o'clock in the morning, in Wuhan, two 1.3-meter-tall humanoid robots begin moving with precision. They turn, jump, and...
Carolina Vivianti - January 30, 2026
   Next »

What if the US shut down the cloud tomorrow? The EU has no plan and legislates with little thought.

As the cloud becomes the heart of the digital economy, the European Union faces a historic choice: whether to transform cloud certification into a tool of sovereignty or limit it...

Goodbye to NTLM! Microsoft is moving towards a new era of authentication with Kerberos

For over three decades, it has been a silent pillar of the Windows ecosystem. Now, however, NTLM 's time seems definitively over. Microsoft has decided to initiate a profound transition...

Penetration testing tools are evolving: open source enters a new phase

In recent months, the penetration testing landscape has been undergoing a profound and accelerated transformation. So-called agentic tools , i.e., tools capable of autonomously orchestrating multiple phases of a security...

SCADA Systems at Risk: Why File System Security Matters More Than Ever

SCADA system security requires rigorous management of processes operating with elevated privileges. A recent technical analysis has examined the CVE-2025-0921 vulnerability in the ICONICS Suite, a supervisory system used in...

Critical vulnerability in Apache bRPC: Arbitrary command execution on the server

A CyberArk Labs research team has identified a critical flaw in the widely used Apache bRPC framework, which allows remote command execution on a server. The security issue has been...

The world’s first humanoid robot store has opened in China. Will we be ready?

At ten o'clock in the morning, in Wuhan, two 1.3-meter-tall humanoid robots begin moving with precision. They turn, jump, and follow a rhythm. It's the opening signal for the country's...

Ivanti Takes Action: Zero-Day Flaws Affect Mobile Endpoint Manager

Ivanti has released a series of critical updates to address two security vulnerabilities affecting Ivanti Endpoint Manager Mobile (EPMM). These vulnerabilities are being actively exploited in zero-day attacks, prompting the...

Elk Cloner: The first computer virus in history began as a prank

In the late 1990s, the Internet was still small, slow, and accessible to a select few. Back then, being a " geek " meant having a technical knowledge that seemed...

Johnson Controls Score 10 Vulnerabilities: Smart Buildings Are at Risk

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a maximum severity alert regarding a security flaw affecting Johnson Controls, a global leader in smart building technology. This vulnerability, classified...

Douglas Engelbart was born today: the man who saw and invented the digital future.

Sometimes, when you think about it, you wonder how we take the world around us for granted. Like, we click, scroll, type, and it all seems so natural, as if...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE