Red Hot Cyber
Cybersecurity, Cybercrime News and Vulnerability Analysis
Banner Desktop

Day: November 12, 2021

Numero di articoli trovati: 1210

Shadow Campaigns Exposed: Global Espionage Hitting 37 Countries

In a sprawling investigation, security researchers have pulled back the curtain on a sophisticated cyber-espionage operation dubbed the "Shadow Campaigns." This covert effort, tracked as TGR-STA-1030, has targeted governments and...

SystemBC Malware: A Growing Threat to Global Servers

A new wave of cyber threats is quietly impacting servers worldwide. The malware, known as SystemBC, has been detected infecting over 10,000 IP addresses, including some hosting government websites. Security...

Hackers Breach SonicWall, Then Wipe Out Every Security Tool—How?

In early February 2026, a sophisticated attack caught the attention of cybersecurity experts. Threat actors gained entry to a network using compromised SonicWall SSLVPN credentials. Once inside, they unleashed a...

The VMware vulnerability attackers are chaining for full hypervisor takeover

Ransomware operators are once again focusing on the virtualization layer, and recent confirmations from U.S. authorities show how exposed enterprise environments have become when hypervisors are left unpatched. exploitation confirmed...

Supply Chain Attack: How Notepad++ Was Compromised via CVE-2025-15556

In cybersecurity, we often focus on finding complex bugs in source code, ignoring the fact that end-user trust is built on a much simpler foundation: a download link. The Notepad++...

Microsoft Office under attack: the bug needs to be patched to prevent Russian espionage.

In recent days, APT28 , a well-known Russian-linked hacker group, has intensified its attacks by exploiting a vulnerability in Microsoft Office. The flaw, classified as CVE-2026-21509, was disclosed by Microsoft...

What if the US shut down the cloud tomorrow? The EU has no plan and legislates with little thought.

As the cloud becomes the heart of the digital economy, the European Union faces a historic choice: whether to transform cloud certification into a tool of sovereignty or limit it...

Goodbye to NTLM! Microsoft is moving towards a new era of authentication with Kerberos

For over three decades, it has been a silent pillar of the Windows ecosystem. Now, however, NTLM 's time seems definitively over. Microsoft has decided to initiate a profound transition...

Penetration testing tools are evolving: open source enters a new phase

In recent months, the penetration testing landscape has been undergoing a profound and accelerated transformation. So-called agentic tools , i.e., tools capable of autonomously orchestrating multiple phases of a security...

SCADA Systems at Risk: Why File System Security Matters More Than Ever

SCADA system security requires rigorous management of processes operating with elevated privileges. A recent technical analysis has examined the CVE-2025-0921 vulnerability in the ICONICS Suite, a supervisory system used in...