Red Hot Cyber. The Cybersecurity Blog

Linux Pwned! Privilege Escalation on SUDO in 5 seconds. HackerHood tests the CVE-2025-32463 exploit
Yesterday, Red Hot Cyber published an in-depth analysis of a gserious vulnerability discovered in SUDO (CVE-2025-32463), which allows escalation of privileges to root in Linux environments by exploiting an abuse of the chroot function. The exploit, made public by Stratascale,

North Korean Hackers on the Payroll: How Companies Paid Salaries to North Korean IT Specialists
The US Department of Justice has announced the discovery ofa large-scale scheme in which fake IT specialists from the DPRK obtained jobs at American companies by posing as citizens of other countries. In fact, we at Red Hot Cyber have

The Story of Open Source: A Success Story of Humankind
Author: Massimiliano Brolli, Pietro CornelioPublishing Date: 11/01/2021 Open source software is so present and integrated into our daily lives today that it would be difficult to think of a world without it. Talking about Linux, Android, Apache, are just some

Do you really know what Hacktivism means? It’s a “special message of hope!”
“Hacktivism, a special message of hope.” Thus begins the “Hacktivism Declaration”, published on July 4, 2001 by the famous hacker group Cult of the dead Cow (also called cDc or Omega). “Free speech is under siege on the fringes of

The History of FreeBSD
We have often talked about Linux and the open source world, Windows and proprietary software and operating systems in general. But starting from the seed of Ken Thompson’s Unix, many operating systems have taken shape over time, and apart from

HoneyPLC: the new honeypot that revolutionizes the defense of industrial plants
Industrial Control Systems (ICS), critical to the operation of critical infrastructure such as power, water and transportation networks, are increasingly vulnerable to cyberattacks. In this context, the article HoneyPLC: A Next-Generation Honeypot for Industrial Control Systemse proposes an advanced and

Linux Pwned! Privilege Escalation on SUDO in 5 seconds. HackerHood tests the CVE-2025-32463 exploit
Redazione RHC - July 2nd, 2025
Yesterday, Red Hot Cyber published an in-depth analysis of a gserious vulnerability discovered in SUDO (CVE-2025-32463), which allows escalation of privileges to root in Linux environments by exploiting an abuse...

North Korean Hackers on the Payroll: How Companies Paid Salaries to North Korean IT Specialists
Redazione RHC - July 2nd, 2025
The US Department of Justice has announced the discovery ofa large-scale scheme in which fake IT specialists from the DPRK obtained jobs at American companies by posing as citizens of...

The Story of Open Source: A Success Story of Humankind
Massimiliano Brolli - July 2nd, 2025
Author: Massimiliano Brolli, Pietro CornelioPublishing Date: 11/01/2021 Open source software is so present and integrated into our daily lives today that it would be difficult to think of a world...

Do you really know what Hacktivism means? It’s a “special message of hope!”
Redazione RHC - July 2nd, 2025
“Hacktivism, a special message of hope." Thus begins the "Hacktivism Declaration", published on July 4, 2001 by the famous hacker group Cult of the dead Cow (also called cDc or...
Sign up for the newsletter