Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

LECS 970x120 1
Precedente Successivo

Latest news

What if the US shut down the cloud tomorrow? The EU has no plan and legislates with little thought. Cyberpolitics

What if the US shut down the cloud tomorrow? The EU has no plan and legislates with little thought.

As the cloud becomes the heart of the digital economy, the European Union faces a historic choice: whether to transform...
Marcello Filacchioni - February 2, 2026
Goodbye to NTLM! Microsoft is moving towards a new era of authentication with Kerberos Cyber News

Goodbye to NTLM! Microsoft is moving towards a new era of authentication with Kerberos

For over three decades, it has been a silent pillar of the Windows ecosystem. Now, however, NTLM 's time seems...
Silvia Felici - February 1, 2026
SCADA Systems at Risk: Why File System Security Matters More Than Ever Vulnerability

SCADA Systems at Risk: Why File System Security Matters More Than Ever

SCADA system security requires rigorous management of processes operating with elevated privileges. A recent technical analysis has examined the CVE-2025-0921...
Carolina Vivianti - January 31, 2026
Critical vulnerability in Apache bRPC: Arbitrary command execution on the server Cyber News

Critical vulnerability in Apache bRPC: Arbitrary command execution on the server

A CyberArk Labs research team has identified a critical flaw in the widely used Apache bRPC framework, which allows remote...
Bajram Zeqiri - January 31, 2026
The world’s first humanoid robot store has opened in China. Will we be ready? innovation

The world’s first humanoid robot store has opened in China. Will we be ready?

At ten o'clock in the morning, in Wuhan, two 1.3-meter-tall humanoid robots begin moving with precision. They turn, jump, and...
Carolina Vivianti - January 30, 2026
Ivanti Takes Action: Zero-Day Flaws Affect Mobile Endpoint Manager Cyber News

Ivanti Takes Action: Zero-Day Flaws Affect Mobile Endpoint Manager

Ivanti has released a series of critical updates to address two security vulnerabilities affecting Ivanti Endpoint Manager Mobile (EPMM). These...
Redazione RHC - January 30, 2026

WhatsApp gets a makeover: “Paranoia” mode arrives (and no, it’s not for everyone).

WhatsApp has decided to toughen up. Not for everyone, not always, but when needed. The decision comes against a backdrop of a now-familiar climate: increasing cyber attacks, espionage that no...

BitLocker Under Fire: Microsoft Admits Handing Over Encryption Keys to FBI

Digital security today faces a troubling crossroads that affects millions of Windows users worldwide. Microsoft BitLocker, the popular proprietary encryption mechanism, allows you to protect data on hard drives, but...

Smartphones rented without your knowledge: Google dismantles a global proxy network

Android has never been so exploited, at least according to the latest developments reported by a recent investigation. Google announced that it has dismantled what may be the largest network...

AI doesn’t ask for permission: it’s rewriting the rules quickly and probably badly

Artificial intelligence has entered the workplace without knocking. Not as a loud revolution, but as a constant presence, almost banal from dint of repetition. It has changed the way people...

Beware of “I am not a robot”: the malware trap that uses Google Calendar.

A new threat is lurking, exploiting our greatest weakness: habit. How many times, in fact, do you find yourself clicking on verification boxes without thinking twice? Now, it seems that...

WinRAR as a Weapon: Google Discovers a Vulnerability Exploited by APTs and Cybercriminals

The WinRAR security flaw, which emerged last summer, has become more widespread than expected. Several organizations, both common criminals and nationally funded APT groups, are actively exploiting this vulnerability, as...

Latin America under digital siege: the numbers that worry experts

In recent months, Latin America and the Caribbean have become the most targeted region by cyberattacks globally, surpassing Africa in terms of overall risk. This data emerges from the latest...

A blow to the heart of cybercrime: RAMP taken offline. The “temple” of ransomware falls!

The RAMP (Russian Anonymous Marketplace) forum, one of the main hubs of the international cybercrime underground, has been officially shut down and seized by US law enforcement . The news...

Is privacy dead? No, but it’s in a coma! What are we really celebrating today, January 28th?

Today is January 28th, and like every year for quite some time now, we find ourselves celebrating European Data Protection Day. It's something that started around 2006, to commemorate the...

n8n Alert: Two critical RCE vulnerabilities discovered (CVE-2026-1470). Update now!

The n8n platform, a widely adopted open source software for orchestrating enterprise automation and workflows, was recently at the center of a new security alert: two vulnerabilities emerged in its...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE