Red Hot Cyber
Cybersecurity, Cybercrime News and Vulnerability Analysis
Heliaca 970x120 1

Author: Redazione RHC

Redazione RHC

The Red Hot Cyber Editorial Team provides daily updates on bugs, data breaches, and global threats. Every piece of content is validated by our community of experts, including Pietro Melillo, Massimiliano Brolli, Sandro Sana, Olivia Terragni, and Stefano Gazzella.

Through synergy with our industry-leading partners—such as Accenture, CrowdStrike, Trend Micro, and Fortinet—we transform technical complexity into collective awareness. We ensure information accuracy by analyzing primary sources and maintaining a rigorous technical peer-review process.

Numero di articoli trovati: 375

Cloud Backups Gone Wrong: SonicWall Firewall Configurations Exposed

In September 2025, SonicWall disclosed a cloud security incident that quickly drew attention across the cybersecurity community. What initially appeared to affect only a limited number of firewall customers was...

CVE-2026-21643: Critical SQL Injection Vulnerability in Fortinet FortiClientEMS

Recently, a significant vulnerability has been reported in Fortinet FortiClientEMS 7.4.4. This flaw could allow an unauthenticated attacker to execute commands or code without permission, exploiting specially crafted HTTP requests....

Hackers Publish Malicious dYdX Packages on npm and PyPI: Wallets at Risk

A recent supply chain attack has drawn attention in the developer and crypto communities. On February 5, 2026, Socket's security team detected malicious dYdX packages uploaded to npm and PyPI....

Cisco Meeting Management Risk: File Upload Could Lead to System Root

A recently disclosed Cisco vulnerability has drawn attention across cybersecurity circles because of the way it lets authenticated users bypass expected safeguards. This issue isn't theoretical - it's a real...

Shadow Campaigns Exposed: Global Espionage Hitting 37 Countries

In a sprawling investigation, security researchers have pulled back the curtain on a sophisticated cyber-espionage operation dubbed the "Shadow Campaigns." This covert effort, tracked as TGR-STA-1030, has targeted governments and...

SystemBC Malware: A Growing Threat to Global Servers

A new wave of cyber threats is quietly impacting servers worldwide. The malware, known as SystemBC, has been detected infecting over 10,000 IP addresses, including some hosting government websites. Security...

Hackers Breach SonicWall, Then Wipe Out Every Security Tool—How?

In early February 2026, a sophisticated attack caught the attention of cybersecurity experts. Threat actors gained entry to a network using compromised SonicWall SSLVPN credentials. Once inside, they unleashed a...

The VMware vulnerability attackers are chaining for full hypervisor takeover

Ransomware operators are once again focusing on the virtualization layer, and recent confirmations from U.S. authorities show how exposed enterprise environments have become when hypervisors are left unpatched. exploitation confirmed...

Ivanti Takes Action: Zero-Day Flaws Affect Mobile Endpoint Manager

Ivanti has released a series of critical updates to address two security vulnerabilities affecting Ivanti Endpoint Manager Mobile (EPMM). These vulnerabilities are being actively exploited in zero-day attacks, prompting the...

Johnson Controls Score 10 Vulnerabilities: Smart Buildings Are at Risk

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a maximum severity alert regarding a security flaw affecting Johnson Controls, a global leader in smart building technology. This vulnerability, classified...