Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

970x120 Olympous
Precedente Successivo

Latest news

Fake 7-Zip Downloads Turn PCs Into Proxies: How to Spot and Stop It Cyber News

Fake 7-Zip Downloads Turn PCs Into Proxies: How to Spot and Stop It

It sounds almost unreal, yet it's happening: a download most people consider safe can quietly turn into a well-designed trap,...
Redazione RHC - February 9, 2026
Payment Networks Shut Down: What Caused the Card Chaos & How to Bounce Back Cyber News

Payment Networks Shut Down: What Caused the Card Chaos & How to Bounce Back

Some mornings feel like a throwback, right? You wake up scrolling and suddenly read that card machines across parts of...
Redazione RHC - February 9, 2026
Cloud logs under threat? The method that exposes attackers early innovation

Cloud logs under threat? The method that exposes attackers early

You know that feeling when cloud alerts keep piling up and you're left wondering whether it's just background noise or...
Carolina Vivianti - February 7, 2026
Robots in search of flesh: When AI rents peripherals. Your body! innovation

Robots in search of flesh: When AI rents peripherals. Your body!

The evolution of Artificial Intelligence has crossed a new, disturbing frontier. If until yesterday we were talking about algorithms confined...
Silvia Felici - February 6, 2026
Cloud Backups Gone Wrong: SonicWall Firewall Configurations Exposed Cyber News

Cloud Backups Gone Wrong: SonicWall Firewall Configurations Exposed

In September 2025, SonicWall disclosed a cloud security incident that quickly drew attention across the cybersecurity community. What initially appeared...
Redazione RHC - February 6, 2026
CVE-2026-21643: Critical SQL Injection Vulnerability in Fortinet FortiClientEMS Cyber News

CVE-2026-21643: Critical SQL Injection Vulnerability in Fortinet FortiClientEMS

Recently, a significant vulnerability has been reported in Fortinet FortiClientEMS 7.4.4. This flaw could allow an unauthenticated attacker to execute...
Redazione RHC - February 6, 2026
   Next »

Fake 7-Zip Downloads Turn PCs Into Proxies: How to Spot and Stop It

It sounds almost unreal, yet it's happening: a download most people consider safe can quietly turn into a well-designed trap, exposing a system and transforming it into a proxy node....

Payment Networks Shut Down: What Caused the Card Chaos & How to Bounce Back

Some mornings feel like a throwback, right? You wake up scrolling and suddenly read that card machines across parts of the US just… stopped working. Like the '90s all over...

Cloud logs under threat? The method that exposes attackers early

You know that feeling when cloud alerts keep piling up and you're left wondering whether it's just background noise or something genuinely bad unfolding? Yeah, it happens all the time....

Robots in search of flesh: When AI rents peripherals. Your body!

The evolution of Artificial Intelligence has crossed a new, disturbing frontier. If until yesterday we were talking about algorithms confined behind a screen, today we are faced with the concept...

Cloud Backups Gone Wrong: SonicWall Firewall Configurations Exposed

In September 2025, SonicWall disclosed a cloud security incident that quickly drew attention across the cybersecurity community. What initially appeared to affect only a limited number of firewall customers was...

CVE-2026-21643: Critical SQL Injection Vulnerability in Fortinet FortiClientEMS

Recently, a significant vulnerability has been reported in Fortinet FortiClientEMS 7.4.4. This flaw could allow an unauthenticated attacker to execute commands or code without permission, exploiting specially crafted HTTP requests....

Hackers Publish Malicious dYdX Packages on npm and PyPI: Wallets at Risk

A recent supply chain attack has drawn attention in the developer and crypto communities. On February 5, 2026, Socket's security team detected malicious dYdX packages uploaded to npm and PyPI....

Cisco Meeting Management Risk: File Upload Could Lead to System Root

A recently disclosed Cisco vulnerability has drawn attention across cybersecurity circles because of the way it lets authenticated users bypass expected safeguards. This issue isn't theoretical - it's a real...

Shadow Campaigns Exposed: Global Espionage Hitting 37 Countries

In a sprawling investigation, security researchers have pulled back the curtain on a sophisticated cyber-espionage operation dubbed the "Shadow Campaigns." This covert effort, tracked as TGR-STA-1030, has targeted governments and...

SystemBC Malware: A Growing Threat to Global Servers

A new wave of cyber threats is quietly impacting servers worldwide. The malware, known as SystemBC, has been detected infecting over 10,000 IP addresses, including some hosting government websites. Security...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE