Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Redhotcyber Banner Sito 970x120px Uscita 101125

Latest news

Ivanti Takes Action: Zero-Day Flaws Affect Mobile Endpoint Manager Cyber News

Ivanti Takes Action: Zero-Day Flaws Affect Mobile Endpoint Manager

Ivanti has released a series of critical updates to address two security vulnerabilities affecting Ivanti Endpoint Manager Mobile (EPMM). These...
Redazione RHC - January 30, 2026
Johnson Controls Score 10 Vulnerabilities: Smart Buildings Are at Risk Cyber News

Johnson Controls Score 10 Vulnerabilities: Smart Buildings Are at Risk

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a maximum severity alert regarding a security flaw affecting Johnson Controls,...
Redazione RHC - January 30, 2026
BitLocker Under Fire: Microsoft Admits Handing Over Encryption Keys to FBI Cyber News

BitLocker Under Fire: Microsoft Admits Handing Over Encryption Keys to FBI

Digital security today faces a troubling crossroads that affects millions of Windows users worldwide. Microsoft BitLocker, the popular proprietary encryption...
Redazione RHC - January 29, 2026
Smartphones rented without your knowledge: Google dismantles a global proxy network Cybercrime

Smartphones rented without your knowledge: Google dismantles a global proxy network

Android has never been so exploited, at least according to the latest developments reported by a recent investigation. Google announced...
Bajram Zeqiri - January 29, 2026
AI doesn’t ask for permission: it’s rewriting the rules quickly and probably badly innovation

AI doesn’t ask for permission: it’s rewriting the rules quickly and probably badly

Artificial intelligence has entered the workplace without knocking. Not as a loud revolution, but as a constant presence, almost banal...
Massimiliano Brolli - January 29, 2026
WinRAR as a Weapon: Google Discovers a Vulnerability Exploited by APTs and Cybercriminals Cybercrime

WinRAR as a Weapon: Google Discovers a Vulnerability Exploited by APTs and Cybercriminals

The WinRAR security flaw, which emerged last summer, has become more widespread than expected. Several organizations, both common criminals and...
Bajram Zeqiri - January 29, 2026
Latin America under digital siege: the numbers that worry experts Culture

Latin America under digital siege: the numbers that worry experts

In recent months, Latin America and the Caribbean have become the most targeted region by cyberattacks globally, surpassing Africa in...
Marcello Filacchioni - January 29, 2026
Is privacy dead? No, but it’s in a coma! What are we really celebrating today, January 28th? Culture

Is privacy dead? No, but it’s in a coma! What are we really celebrating today, January 28th?

Today is January 28th, and like every year for quite some time now, we find ourselves celebrating European Data Protection...
Silvia Felici - January 28, 2026
n8n Alert: Two critical RCE vulnerabilities discovered (CVE-2026-1470). Update now! Cyber News

n8n Alert: Two critical RCE vulnerabilities discovered (CVE-2026-1470). Update now!

The n8n platform, a widely adopted open source software for orchestrating enterprise automation and workflows, was recently at the center...
Redazione RHC - January 28, 2026
Telnet, the return of a ghost. A 2015 bug exploited in 2026: 800,000 devices at risk. Cyber News

Telnet, the return of a ghost. A 2015 bug exploited in 2026: 800,000 devices at risk.

GNU InetUtils is a collection of network utilities (including telnet/telnetd, ftp/ftpd, rsh/rshd, ping, and traceroute) used by several Linux distributions....
Pietro Melillo - January 28, 2026
OpenSSL: 12 security bugs found, including a critical vulnerability Cyber News

OpenSSL: 12 security bugs found, including a critical vulnerability

A security update has been released by maintainers of OpenSSL, the cryptographic library, addressing about a dozen vulnerabilities, including logic...
Bajram Zeqiri - January 28, 2026
Fortinet Vulnerability CVE-2026-24858: Hackers Inside Networks with Legitimate Credentials Cyber News

Fortinet Vulnerability CVE-2026-24858: Hackers Inside Networks with Legitimate Credentials

A serious flaw, classified as CVE-2026-24858, has been confirmed to be exploited in real-world attacks against vulnerable devices. This isn't...
Bajram Zeqiri - January 28, 2026

Cisco Meeting Management Risk: File Upload Could Lead to System Root

A recently disclosed Cisco vulnerability has drawn attention across cybersecurity circles because of the way it lets authenticated users bypass expected safeguards. This issue isn't theoretical - it's a real...

Shadow Campaigns Exposed: Global Espionage Hitting 37 Countries

In a sprawling investigation, security researchers have pulled back the curtain on a sophisticated cyber-espionage operation dubbed the "Shadow Campaigns." This covert effort, tracked as TGR-STA-1030, has targeted governments and...

SystemBC Malware: A Growing Threat to Global Servers

A new wave of cyber threats is quietly impacting servers worldwide. The malware, known as SystemBC, has been detected infecting over 10,000 IP addresses, including some hosting government websites. Security...

Hackers Breach SonicWall, Then Wipe Out Every Security Tool—How?

In early February 2026, a sophisticated attack caught the attention of cybersecurity experts. Threat actors gained entry to a network using compromised SonicWall SSLVPN credentials. Once inside, they unleashed a...

The VMware vulnerability attackers are chaining for full hypervisor takeover

Ransomware operators are once again focusing on the virtualization layer, and recent confirmations from U.S. authorities show how exposed enterprise environments have become when hypervisors are left unpatched. exploitation confirmed...

Supply Chain Attack: How Notepad++ Was Compromised via CVE-2025-15556

In cybersecurity, we often focus on finding complex bugs in source code, ignoring the fact that end-user trust is built on a much simpler foundation: a download link. The Notepad++...

Microsoft Office under attack: the bug needs to be patched to prevent Russian espionage.

In recent days, APT28 , a well-known Russian-linked hacker group, has intensified its attacks by exploiting a vulnerability in Microsoft Office. The flaw, classified as CVE-2026-21509, was disclosed by Microsoft...

What if the US shut down the cloud tomorrow? The EU has no plan and legislates with little thought.

As the cloud becomes the heart of the digital economy, the European Union faces a historic choice: whether to transform cloud certification into a tool of sovereignty or limit it...

Goodbye to NTLM! Microsoft is moving towards a new era of authentication with Kerberos

For over three decades, it has been a silent pillar of the Windows ecosystem. Now, however, NTLM 's time seems definitively over. Microsoft has decided to initiate a profound transition...

SCADA Systems at Risk: Why File System Security Matters More Than Ever

SCADA system security requires rigorous management of processes operating with elevated privileges. A recent technical analysis has examined the CVE-2025-0921 vulnerability in the ICONICS Suite, a supervisory system used in...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE