Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

UtiliaCS 970x120
Precedente Successivo

Latest news

SystemBC Malware: A Growing Threat to Global Servers Cyber News

SystemBC Malware: A Growing Threat to Global Servers

A new wave of cyber threats is quietly impacting servers worldwide. The malware, known as SystemBC, has been detected infecting...
Redazione RHC - February 5, 2026
Hackers Breach SonicWall, Then Wipe Out Every Security Tool—How? Cyber News

Hackers Breach SonicWall, Then Wipe Out Every Security Tool—How?

In early February 2026, a sophisticated attack caught the attention of cybersecurity experts. Threat actors gained entry to a network...
Redazione RHC - February 5, 2026
The VMware vulnerability attackers are chaining for full hypervisor takeover Cyber News

The VMware vulnerability attackers are chaining for full hypervisor takeover

Ransomware operators are once again focusing on the virtualization layer, and recent confirmations from U.S. authorities show how exposed enterprise...
Redazione RHC - February 5, 2026
Supply Chain Attack: How Notepad++ Was Compromised via CVE-2025-15556 Cybercrime

Supply Chain Attack: How Notepad++ Was Compromised via CVE-2025-15556

In cybersecurity, we often focus on finding complex bugs in source code, ignoring the fact that end-user trust is built...
Manuel Roccon - February 4, 2026
Microsoft Office under attack: the bug needs to be patched to prevent Russian espionage. Cyber News

Microsoft Office under attack: the bug needs to be patched to prevent Russian espionage.

In recent days, APT28 , a well-known Russian-linked hacker group, has intensified its attacks by exploiting a vulnerability in Microsoft...
Bajram Zeqiri - February 3, 2026
What if the US shut down the cloud tomorrow? The EU has no plan and legislates with little thought. Cyberpolitics

What if the US shut down the cloud tomorrow? The EU has no plan and legislates with little thought.

As the cloud becomes the heart of the digital economy, the European Union faces a historic choice: whether to transform...
Marcello Filacchioni - February 2, 2026

Microsoft Office under attack: the bug needs to be patched to prevent Russian espionage.

In recent days, APT28 , a well-known Russian-linked hacker group, has intensified its attacks by exploiting a vulnerability in Microsoft Office. The flaw, classified as CVE-2026-21509, was disclosed by Microsoft...

What if the US shut down the cloud tomorrow? The EU has no plan and legislates with little thought.

As the cloud becomes the heart of the digital economy, the European Union faces a historic choice: whether to transform cloud certification into a tool of sovereignty or limit it...

Goodbye to NTLM! Microsoft is moving towards a new era of authentication with Kerberos

For over three decades, it has been a silent pillar of the Windows ecosystem. Now, however, NTLM 's time seems definitively over. Microsoft has decided to initiate a profound transition...

SCADA Systems at Risk: Why File System Security Matters More Than Ever

SCADA system security requires rigorous management of processes operating with elevated privileges. A recent technical analysis has examined the CVE-2025-0921 vulnerability in the ICONICS Suite, a supervisory system used in...

Critical vulnerability in Apache bRPC: Arbitrary command execution on the server

A CyberArk Labs research team has identified a critical flaw in the widely used Apache bRPC framework, which allows remote command execution on a server. The security issue has been...

The world’s first humanoid robot store has opened in China. Will we be ready?

At ten o'clock in the morning, in Wuhan, two 1.3-meter-tall humanoid robots begin moving with precision. They turn, jump, and follow a rhythm. It's the opening signal for the country's...

Ivanti Takes Action: Zero-Day Flaws Affect Mobile Endpoint Manager

Ivanti has released a series of critical updates to address two security vulnerabilities affecting Ivanti Endpoint Manager Mobile (EPMM). These vulnerabilities are being actively exploited in zero-day attacks, prompting the...

Johnson Controls Score 10 Vulnerabilities: Smart Buildings Are at Risk

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a maximum severity alert regarding a security flaw affecting Johnson Controls, a global leader in smart building technology. This vulnerability, classified...

Douglas Engelbart was born today: the man who saw and invented the digital future.

Sometimes, when you think about it, you wonder how we take the world around us for granted. Like, we click, scroll, type, and it all seems so natural, as if...

WhatsApp gets a makeover: “Paranoia” mode arrives (and no, it’s not for everyone).

WhatsApp has decided to toughen up. Not for everyone, not always, but when needed. The decision comes against a backdrop of a now-familiar climate: increasing cyber attacks, espionage that no...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE