Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

970x20 Itcentric
Precedente Successivo

Latest news

The VMware vulnerability attackers are chaining for full hypervisor takeover Cyber News

The VMware vulnerability attackers are chaining for full hypervisor takeover

Ransomware operators are once again focusing on the virtualization layer, and recent confirmations from U.S. authorities show how exposed enterprise...
Redazione RHC - February 5, 2026
Supply Chain Attack: How Notepad++ Was Compromised via CVE-2025-15556 Cybercrime

Supply Chain Attack: How Notepad++ Was Compromised via CVE-2025-15556

In cybersecurity, we often focus on finding complex bugs in source code, ignoring the fact that end-user trust is built...
Manuel Roccon - February 4, 2026
Microsoft Office under attack: the bug needs to be patched to prevent Russian espionage. Cyber News

Microsoft Office under attack: the bug needs to be patched to prevent Russian espionage.

In recent days, APT28 , a well-known Russian-linked hacker group, has intensified its attacks by exploiting a vulnerability in Microsoft...
Bajram Zeqiri - February 3, 2026
What if the US shut down the cloud tomorrow? The EU has no plan and legislates with little thought. Cyberpolitics

What if the US shut down the cloud tomorrow? The EU has no plan and legislates with little thought.

As the cloud becomes the heart of the digital economy, the European Union faces a historic choice: whether to transform...
Marcello Filacchioni - February 2, 2026
Goodbye to NTLM! Microsoft is moving towards a new era of authentication with Kerberos Cyber News

Goodbye to NTLM! Microsoft is moving towards a new era of authentication with Kerberos

For over three decades, it has been a silent pillar of the Windows ecosystem. Now, however, NTLM 's time seems...
Silvia Felici - February 1, 2026
SCADA Systems at Risk: Why File System Security Matters More Than Ever Vulnerability

SCADA Systems at Risk: Why File System Security Matters More Than Ever

SCADA system security requires rigorous management of processes operating with elevated privileges. A recent technical analysis has examined the CVE-2025-0921...
Carolina Vivianti - January 31, 2026

Ivanti Takes Action: Zero-Day Flaws Affect Mobile Endpoint Manager

Ivanti has released a series of critical updates to address two security vulnerabilities affecting Ivanti Endpoint Manager Mobile (EPMM). These vulnerabilities are being actively exploited in zero-day attacks, prompting the...

Johnson Controls Score 10 Vulnerabilities: Smart Buildings Are at Risk

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a maximum severity alert regarding a security flaw affecting Johnson Controls, a global leader in smart building technology. This vulnerability, classified...

Douglas Engelbart was born today: the man who saw and invented the digital future.

Sometimes, when you think about it, you wonder how we take the world around us for granted. Like, we click, scroll, type, and it all seems so natural, as if...

WhatsApp gets a makeover: “Paranoia” mode arrives (and no, it’s not for everyone).

WhatsApp has decided to toughen up. Not for everyone, not always, but when needed. The decision comes against a backdrop of a now-familiar climate: increasing cyber attacks, espionage that no...

BitLocker Under Fire: Microsoft Admits Handing Over Encryption Keys to FBI

Digital security today faces a troubling crossroads that affects millions of Windows users worldwide. Microsoft BitLocker, the popular proprietary encryption mechanism, allows you to protect data on hard drives, but...

Smartphones rented without your knowledge: Google dismantles a global proxy network

Android has never been so exploited, at least according to the latest developments reported by a recent investigation. Google announced that it has dismantled what may be the largest network...

AI doesn’t ask for permission: it’s rewriting the rules quickly and probably badly

Artificial intelligence has entered the workplace without knocking. Not as a loud revolution, but as a constant presence, almost banal from dint of repetition. It has changed the way people...

Beware of “I am not a robot”: the malware trap that uses Google Calendar.

A new threat is lurking, exploiting our greatest weakness: habit. How many times, in fact, do you find yourself clicking on verification boxes without thinking twice? Now, it seems that...

WinRAR as a Weapon: Google Discovers a Vulnerability Exploited by APTs and Cybercriminals

The WinRAR security flaw, which emerged last summer, has become more widespread than expected. Several organizations, both common criminals and nationally funded APT groups, are actively exploiting this vulnerability, as...

Latin America under digital siege: the numbers that worry experts

In recent months, Latin America and the Caribbean have become the most targeted region by cyberattacks globally, surpassing Africa in terms of overall risk. This data emerges from the latest...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE