Red Hot Cyber
Cybersecurity, Cybercrime News and Vulnerability Analysis
UtiliaCS 970x120

Author: Redazione RHC

Redazione RHC

The Red Hot Cyber Editorial Team provides daily updates on bugs, data breaches, and global threats. Every piece of content is validated by our community of experts, including Pietro Melillo, Massimiliano Brolli, Sandro Sana, Olivia Terragni, and Stefano Gazzella.

Through synergy with our industry-leading partners—such as Accenture, CrowdStrike, Trend Micro, and Fortinet—we transform technical complexity into collective awareness. We ensure information accuracy by analyzing primary sources and maintaining a rigorous technical peer-review process.

Numero di articoli trovati: 377

Fake 7-Zip Downloads Turn PCs Into Proxies: How to Spot and Stop It

It sounds almost unreal, yet it's happening: a download most people consider safe can quietly turn into a well-designed trap, exposing a system and transforming it into a proxy node....

Payment Networks Shut Down: What Caused the Card Chaos & How to Bounce Back

Some mornings feel like a throwback, right? You wake up scrolling and suddenly read that card machines across parts of the US just… stopped working. Like the '90s all over...

Cloud Backups Gone Wrong: SonicWall Firewall Configurations Exposed

In September 2025, SonicWall disclosed a cloud security incident that quickly drew attention across the cybersecurity community. What initially appeared to affect only a limited number of firewall customers was...

CVE-2026-21643: Critical SQL Injection Vulnerability in Fortinet FortiClientEMS

Recently, a significant vulnerability has been reported in Fortinet FortiClientEMS 7.4.4. This flaw could allow an unauthenticated attacker to execute commands or code without permission, exploiting specially crafted HTTP requests....

Hackers Publish Malicious dYdX Packages on npm and PyPI: Wallets at Risk

A recent supply chain attack has drawn attention in the developer and crypto communities. On February 5, 2026, Socket's security team detected malicious dYdX packages uploaded to npm and PyPI....

Cisco Meeting Management Risk: File Upload Could Lead to System Root

A recently disclosed Cisco vulnerability has drawn attention across cybersecurity circles because of the way it lets authenticated users bypass expected safeguards. This issue isn't theoretical - it's a real...

Shadow Campaigns Exposed: Global Espionage Hitting 37 Countries

In a sprawling investigation, security researchers have pulled back the curtain on a sophisticated cyber-espionage operation dubbed the "Shadow Campaigns." This covert effort, tracked as TGR-STA-1030, has targeted governments and...

SystemBC Malware: A Growing Threat to Global Servers

A new wave of cyber threats is quietly impacting servers worldwide. The malware, known as SystemBC, has been detected infecting over 10,000 IP addresses, including some hosting government websites. Security...

Hackers Breach SonicWall, Then Wipe Out Every Security Tool—How?

In early February 2026, a sophisticated attack caught the attention of cybersecurity experts. Threat actors gained entry to a network using compromised SonicWall SSLVPN credentials. Once inside, they unleashed a...

The VMware vulnerability attackers are chaining for full hypervisor takeover

Ransomware operators are once again focusing on the virtualization layer, and recent confirmations from U.S. authorities show how exposed enterprise environments have become when hypervisors are left unpatched. exploitation confirmed...