Red Hot Cyber
Cybersecurity, Cybercrime News and Vulnerability Analysis
HackTheBox 970x120 1

Day: November 7, 2022

Numero di articoli trovati: 1945

Goodbye to NTLM! Microsoft is moving towards a new era of authentication with Kerberos

For over three decades, it has been a silent pillar of the Windows ecosystem. Now, however, NTLM 's time seems definitively over. Microsoft has decided to initiate a profound transition...

Penetration testing tools are evolving: open source enters a new phase

In recent months, the penetration testing landscape has been undergoing a profound and accelerated transformation. So-called agentic tools , i.e., tools capable of autonomously orchestrating multiple phases of a security...

Goodbye to NTLM! Microsoft is moving towards a new era of authentication with Kerberos.

For over three decades, it has been a silent pillar of the Windows ecosystem. Now, however, NTLM 's time seems definitively over. Microsoft has decided to initiate a profound transition...

SCADA Systems at Risk: Why File System Security Matters More Than Ever

SCADA system security requires rigorous management of processes operating with elevated privileges. A recent technical analysis has examined the CVE-2025-0921 vulnerability in the ICONICS Suite, a supervisory system used in...

Critical vulnerability in Apache bRPC: Arbitrary command execution on the server

A CyberArk Labs research team has identified a critical flaw in the widely used Apache bRPC framework, which allows remote command execution on a server. The security issue has been...

The world’s first humanoid robot store has opened in China. Will we be ready?

At ten o'clock in the morning, in Wuhan, two 1.3-meter-tall humanoid robots begin moving with precision. They turn, jump, and follow a rhythm. It's the opening signal for the country's...

Ivanti Takes Action: Zero-Day Flaws Affect Mobile Endpoint Manager

Ivanti has released a series of critical updates to address two security vulnerabilities affecting Ivanti Endpoint Manager Mobile (EPMM). These vulnerabilities are being actively exploited in zero-day attacks, prompting the...

Photoshop Now Runs on Linux. A Hacker Did It, and There’s Hope Finally

Something has happened in the Linux world that many designers and retouchers had almost given up on: a modern Photoshop has finally been released. Not the old versions, which were...

Elk Cloner: The first computer virus in history began as a prank

In the late 1990s, the Internet was still small, slow, and accessible to a select few. Back then, being a " geek " meant having a technical knowledge that seemed...

Johnson Controls Score 10 Vulnerabilities: Smart Buildings Are at Risk

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a maximum severity alert regarding a security flaw affecting Johnson Controls, a global leader in smart building technology. This vulnerability, classified...