Red Hot Cyber
Cybersecurity, Cybercrime News and Vulnerability Analysis
UtiliaCS 970x120

Day: June 28, 2022

Numero di articoli trovati: 1946

Penetration testing tools are evolving: open source enters a new phase

In recent months, the penetration testing landscape has been undergoing a profound and accelerated transformation. So-called agentic tools , i.e., tools capable of autonomously orchestrating multiple phases of a security...

Goodbye to NTLM! Microsoft is moving towards a new era of authentication with Kerberos.

For over three decades, it has been a silent pillar of the Windows ecosystem. Now, however, NTLM 's time seems definitively over. Microsoft has decided to initiate a profound transition...

SCADA Systems at Risk: Why File System Security Matters More Than Ever

SCADA system security requires rigorous management of processes operating with elevated privileges. A recent technical analysis has examined the CVE-2025-0921 vulnerability in the ICONICS Suite, a supervisory system used in...

Critical vulnerability in Apache bRPC: Arbitrary command execution on the server

A CyberArk Labs research team has identified a critical flaw in the widely used Apache bRPC framework, which allows remote command execution on a server. The security issue has been...

The world’s first humanoid robot store has opened in China. Will we be ready?

At ten o'clock in the morning, in Wuhan, two 1.3-meter-tall humanoid robots begin moving with precision. They turn, jump, and follow a rhythm. It's the opening signal for the country's...

Ivanti Takes Action: Zero-Day Flaws Affect Mobile Endpoint Manager

Ivanti has released a series of critical updates to address two security vulnerabilities affecting Ivanti Endpoint Manager Mobile (EPMM). These vulnerabilities are being actively exploited in zero-day attacks, prompting the...

Photoshop Now Runs on Linux. A Hacker Did It, and There’s Hope Finally

Something has happened in the Linux world that many designers and retouchers had almost given up on: a modern Photoshop has finally been released. Not the old versions, which were...

Elk Cloner: The first computer virus in history began as a prank

In the late 1990s, the Internet was still small, slow, and accessible to a select few. Back then, being a " geek " meant having a technical knowledge that seemed...

Johnson Controls Score 10 Vulnerabilities: Smart Buildings Are at Risk

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a maximum severity alert regarding a security flaw affecting Johnson Controls, a global leader in smart building technology. This vulnerability, classified...

Douglas Engelbart was born today: the man who saw and invented the digital future.

Sometimes, when you think about it, you wonder how we take the world around us for granted. Like, we click, scroll, type, and it all seems so natural, as if...