Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Crowdstriker 970×120
Precedente Successivo
   Next »

2149 BREAK THE SPHERE! The RHC & Hack The Box CTF at the RHC Conference 2026

In 2149, the world is no longer divided into nations, but into mega Autonomous City-States, hyper-technological urban giants competing for resources, data, and geopolitical power while the entire world is...

RHC Interviews Anubis Ransomware: Their View on RAMP, LockBit and the RaaS “Market”

Author: Luca Stivali, Raffaela Crisci, Lorenzo Nardi During the preliminary exchange leading up to the interview, Anubis expressed a very clear position regarding the collapse of several historical platforms within...

The Most Dangerous Sentence in IT: “Don’t Worry, They’re on Different VLANs”

In the world of IT, there is one expression that lowers defenses more effectively than any zero-day exploit: "Don't worry, they're on different VLANs." It is a reassuring phrase, usually...

Fake 7-Zip Downloads Turn PCs Into Proxies: How to Spot and Stop It

It sounds almost unreal, yet it's happening: a download most people consider safe can quietly turn into a well-designed trap, exposing a system and transforming it into a proxy node....

Payment Networks Shut Down: What Caused the Card Chaos & How to Bounce Back

Some mornings feel like a throwback, right? You wake up scrolling and suddenly read that card machines across parts of the US just… stopped working. Like the '90s all over...

Cloud logs under threat? The method that exposes attackers early

You know that feeling when cloud alerts keep piling up and you're left wondering whether it's just background noise or something genuinely bad unfolding? Yeah, it happens all the time....

Robots in search of flesh: When AI rents peripherals. Your body!

The evolution of Artificial Intelligence has crossed a new, disturbing frontier. If until yesterday we were talking about algorithms confined behind a screen, today we are faced with the concept...

Cloud Backups Gone Wrong: SonicWall Firewall Configurations Exposed

In September 2025, SonicWall disclosed a cloud security incident that quickly drew attention across the cybersecurity community. What initially appeared to affect only a limited number of firewall customers was...

CVE-2026-21643: Critical SQL Injection Vulnerability in Fortinet FortiClientEMS

Recently, a significant vulnerability has been reported in Fortinet FortiClientEMS 7.4.4. This flaw could allow an unauthenticated attacker to execute commands or code without permission, exploiting specially crafted HTTP requests....

Hackers Publish Malicious dYdX Packages on npm and PyPI: Wallets at Risk

A recent supply chain attack has drawn attention in the developer and crypto communities. On February 5, 2026, Socket's security team detected malicious dYdX packages uploaded to npm and PyPI....

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE