Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

970x20 Itcentric
Precedente Successivo

Latest news

Cloud logs under threat? The method that exposes attackers early Cyber News

Cloud logs under threat? The method that exposes attackers early

You know that feeling when cloud alerts keep piling up and you're left wondering whether it's just background noise or...
Carolina Vivianti - February 7, 2026
Robots in search of flesh: When AI rents peripherals. Your body! innovation

Robots in search of flesh: When AI rents peripherals. Your body!

The evolution of Artificial Intelligence has crossed a new, disturbing frontier. If until yesterday we were talking about algorithms confined...
Silvia Felici - February 6, 2026
Cloud Backups Gone Wrong: SonicWall Firewall Configurations Exposed Cyber News

Cloud Backups Gone Wrong: SonicWall Firewall Configurations Exposed

In September 2025, SonicWall disclosed a cloud security incident that quickly drew attention across the cybersecurity community. What initially appeared...
Redazione RHC - February 6, 2026
CVE-2026-21643: Critical SQL Injection Vulnerability in Fortinet FortiClientEMS Cyber News

CVE-2026-21643: Critical SQL Injection Vulnerability in Fortinet FortiClientEMS

Recently, a significant vulnerability has been reported in Fortinet FortiClientEMS 7.4.4. This flaw could allow an unauthenticated attacker to execute...
Redazione RHC - February 6, 2026
Hackers Publish Malicious dYdX Packages on npm and PyPI: Wallets at Risk Cyber News

Hackers Publish Malicious dYdX Packages on npm and PyPI: Wallets at Risk

A recent supply chain attack has drawn attention in the developer and crypto communities. On February 5, 2026, Socket's security...
Redazione RHC - February 6, 2026
Cisco Meeting Management Risk: File Upload Could Lead to System Root Cyber News

Cisco Meeting Management Risk: File Upload Could Lead to System Root

A recently disclosed Cisco vulnerability has drawn attention across cybersecurity circles because of the way it lets authenticated users bypass...
Redazione RHC - February 6, 2026
   Next »

Cloud logs under threat? The method that exposes attackers early

You know that feeling when cloud alerts keep piling up and you're left wondering whether it's just background noise or something genuinely bad unfolding? Yeah, it happens all the time....

Robots in search of flesh: When AI rents peripherals. Your body!

The evolution of Artificial Intelligence has crossed a new, disturbing frontier. If until yesterday we were talking about algorithms confined behind a screen, today we are faced with the concept...

Cloud Backups Gone Wrong: SonicWall Firewall Configurations Exposed

In September 2025, SonicWall disclosed a cloud security incident that quickly drew attention across the cybersecurity community. What initially appeared to affect only a limited number of firewall customers was...

CVE-2026-21643: Critical SQL Injection Vulnerability in Fortinet FortiClientEMS

Recently, a significant vulnerability has been reported in Fortinet FortiClientEMS 7.4.4. This flaw could allow an unauthenticated attacker to execute commands or code without permission, exploiting specially crafted HTTP requests....

Hackers Publish Malicious dYdX Packages on npm and PyPI: Wallets at Risk

A recent supply chain attack has drawn attention in the developer and crypto communities. On February 5, 2026, Socket's security team detected malicious dYdX packages uploaded to npm and PyPI....

Cisco Meeting Management Risk: File Upload Could Lead to System Root

A recently disclosed Cisco vulnerability has drawn attention across cybersecurity circles because of the way it lets authenticated users bypass expected safeguards. This issue isn't theoretical - it's a real...

Shadow Campaigns Exposed: Global Espionage Hitting 37 Countries

In a sprawling investigation, security researchers have pulled back the curtain on a sophisticated cyber-espionage operation dubbed the "Shadow Campaigns." This covert effort, tracked as TGR-STA-1030, has targeted governments and...

SystemBC Malware: A Growing Threat to Global Servers

A new wave of cyber threats is quietly impacting servers worldwide. The malware, known as SystemBC, has been detected infecting over 10,000 IP addresses, including some hosting government websites. Security...

Hackers Breach SonicWall, Then Wipe Out Every Security Tool—How?

In early February 2026, a sophisticated attack caught the attention of cybersecurity experts. Threat actors gained entry to a network using compromised SonicWall SSLVPN credentials. Once inside, they unleashed a...

The VMware vulnerability attackers are chaining for full hypervisor takeover

Ransomware operators are once again focusing on the virtualization layer, and recent confirmations from U.S. authorities show how exposed enterprise environments have become when hypervisors are left unpatched. exploitation confirmed...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE