Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
UtiliaCS 970x120

Red Hot Cyber – News and insights on cybercrime and cybersecurity

Precedente Successivo

Latest news

Penetration testing tools are evolving: open source enters a new phase innovation

Penetration testing tools are evolving: open source enters a new phase

In recent months, the penetration testing landscape has been undergoing a profound and accelerated transformation. So-called agentic tools , i.e.,...
Massimiliano Brolli - January 31, 2026
Goodbye to NTLM! Microsoft is moving towards a new era of authentication with Kerberos. Cyber News

Goodbye to NTLM! Microsoft is moving towards a new era of authentication with Kerberos.

For over three decades, it has been a silent pillar of the Windows ecosystem. Now, however, NTLM 's time seems...
Silvia Felici - January 31, 2026
SCADA Systems at Risk: Why File System Security Matters More Than Ever Vulnerability

SCADA Systems at Risk: Why File System Security Matters More Than Ever

SCADA system security requires rigorous management of processes operating with elevated privileges. A recent technical analysis has examined the CVE-2025-0921...
Carolina Vivianti - January 31, 2026
Critical vulnerability in Apache bRPC: Arbitrary command execution on the server Cyber News

Critical vulnerability in Apache bRPC: Arbitrary command execution on the server

A CyberArk Labs research team has identified a critical flaw in the widely used Apache bRPC framework, which allows remote...
Bajram Zeqiri - January 31, 2026
The world’s first humanoid robot store has opened in China. Will we be ready? innovation

The world’s first humanoid robot store has opened in China. Will we be ready?

At ten o'clock in the morning, in Wuhan, two 1.3-meter-tall humanoid robots begin moving with precision. They turn, jump, and...
Carolina Vivianti - January 30, 2026
Ivanti Takes Action: Zero-Day Flaws Affect Mobile Endpoint Manager Cyber News

Ivanti Takes Action: Zero-Day Flaws Affect Mobile Endpoint Manager

Ivanti has released a series of critical updates to address two security vulnerabilities affecting Ivanti Endpoint Manager Mobile (EPMM). These...
Redazione RHC - January 30, 2026
   Next »

Penetration testing tools are evolving: open source enters a new phase

In recent months, the penetration testing landscape has been undergoing a profound and accelerated transformation. So-called agentic tools , i.e., tools capable of autonomously orchestrating multiple phases of a security...

Goodbye to NTLM! Microsoft is moving towards a new era of authentication with Kerberos.

For over three decades, it has been a silent pillar of the Windows ecosystem. Now, however, NTLM 's time seems definitively over. Microsoft has decided to initiate a profound transition...

SCADA Systems at Risk: Why File System Security Matters More Than Ever

SCADA system security requires rigorous management of processes operating with elevated privileges. A recent technical analysis has examined the CVE-2025-0921 vulnerability in the ICONICS Suite, a supervisory system used in...

Critical vulnerability in Apache bRPC: Arbitrary command execution on the server

A CyberArk Labs research team has identified a critical flaw in the widely used Apache bRPC framework, which allows remote command execution on a server. The security issue has been...

The world’s first humanoid robot store has opened in China. Will we be ready?

At ten o'clock in the morning, in Wuhan, two 1.3-meter-tall humanoid robots begin moving with precision. They turn, jump, and follow a rhythm. It's the opening signal for the country's...

Ivanti Takes Action: Zero-Day Flaws Affect Mobile Endpoint Manager

Ivanti has released a series of critical updates to address two security vulnerabilities affecting Ivanti Endpoint Manager Mobile (EPMM). These vulnerabilities are being actively exploited in zero-day attacks, prompting the...

Photoshop Now Runs on Linux. A Hacker Did It, and There’s Hope Finally

Something has happened in the Linux world that many designers and retouchers had almost given up on: a modern Photoshop has finally been released. Not the old versions, which were...

Elk Cloner: The first computer virus in history began as a prank

In the late 1990s, the Internet was still small, slow, and accessible to a select few. Back then, being a " geek " meant having a technical knowledge that seemed...

Johnson Controls Score 10 Vulnerabilities: Smart Buildings Are at Risk

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a maximum severity alert regarding a security flaw affecting Johnson Controls, a global leader in smart building technology. This vulnerability, classified...

Douglas Engelbart was born today: the man who saw and invented the digital future.

Sometimes, when you think about it, you wonder how we take the world around us for granted. Like, we click, scroll, type, and it all seems so natural, as if...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE