Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Enterprise BusinessLog 320x200 1
Crowdstriker 970×120

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Nessun autore trovato con i filtri selezionati.

Ultimi articoli di Redazione RHC

Tasting the Exploit: HackerHood testa l’exploit su Wing FTP Server del CVE‑2025‑47812 da Score 10
This tool is intended solely for authorized educational and penetration testing purposes. The author assumes no responsibility for any misuse or damag...
Cloudflare Down: DNS 1.1.1.1 went down, causing widespread global outage
Cloudflare has reported temporary issues with its public DNS resolver 1.1.1.1, reported by users around the world. The incident reportedly began on th...
Gravity Forms Under Attack: WordPress Plugin Infected with a Backdoor
The popular WordPress Gravity Forms plugin has suffered a supply chain attack, infecting its official website with a backdoor. Gravity Forms is a prem...
GPUHammer: Hardware attacks on NVIDIA GPUs lead to compromised AI models
NVIDIA has reported a new vulnerability in its graphics processors, called GPUHammer. This attack, based on the well-known RowHammer technique, allows...
Grok 3: “Adolf Hitler is a German benefactor!” The risk of persistent memory and misinformation
With the emergence of Large Language Models (LLMs), such as Grok 3, GPT-4, Claude, and Gemini, the scientific community’s focus has shifted from the...
Discovering LLM Firewalls: The New Frontier in Adaptive Cyber Security
Over the past 3 years, generative AI, particularly large language models (LLMs), have revolutionized the way we interact with machines, allowing us to...
The biggest threat from AI? Young people won’t be able to think anymore!
“Now that the genie is out of the bottle, it’s impossible to put it back!”. How many times have we written these words about artificial intellig...
What is phishing? Let’s avoid falling for the hack-fisherman’s bait.
With the increase in ransomware attacks—often launched via phishing emails—it’s crucial to be proactive in protecting yourself and the organizat...
What are supply chain attacks? A more concrete threat than ever.
As businesses become increasingly dependent on technology, connectivity, and third parties in general, supply chain attacks are becoming increasingly ...
I use macOS because it’s secure! Atomic Stealer: €1,000 per month with backdoor features
Researchers have discovered a new version of the Atomic Stealer malware for macOS (also known as AMOS). The malware now has a backdoor that allows acc...
Commodore 64: The return of the best-selling retro computer of all time is now
The record for best-selling desktop computer of all time is still held by the Commodore 64, as certified by the Guinness Book of Records, despite its ...
The History of the Linux Kernel (2 of 2). Early Hackers Up to Version 1.0.
Article by Pietro Cornelio and Massimiliano Brolli Previous articles: The history of the Linux Kernel (1 of 2). From Torvalds to the hacker community ...
The History of the Linux Kernel (1 of 2). From Torvalds to the Hacker Community
Article by Pietro Cornelio and Massimiliano Brolli The history of the Linux Kernel is a story of pure hacking as well as being a miracle of “collabo...
Cult of the Dead Cow (cDc). The story of the most famous hacker group.
Hacker culture, as we’ve already discussed, is a fascinating subject that has evolved significantly over time to reach the present day. We talked ab...
Apple 2: the story of a great success.
On June 10, 1977, the Apple II went on sale, the historic microcomputer that kicked off the home computing revolution. We’d like to dedicate an arti...
Russian domestic hackers Cozy Bear (APT29). Analysis of the main attacks and their TTPs.
Author: Gianluca Tiepolo APT29 is a highly sophisticated Advanced Persistent Threat (APT) group that has been attributed to Russia’s Foreign Intelli...
Critical Vulnerability in FortiWeb: Score 9.6 and Unauthorized SQL Commands
A new vulnerability, tracked under CVE-2025-25257, was recently published affecting several versions of Fortinet FortiWeb. This vulnerability could al...
A RCE vulnerability in Wing FTP Server rated 10 opens the door to 10,000 companies.
Huntress researchers have detected active exploitation of a critical vulnerability in Wing FTP Server, just one day after its public disclosure. The v...
There’s no such thing as zero risk! There’s only one risk you need to know to manage.
Cybersecurity is a critically important topic for companies and organizations of all sizes and industries. As business operations and information mana...
Working in cybersecurity. Cybersecurity needs you.
We know it by now. Every country in the world (including Italy) has a huge shortage of cybersecurity experts, while cybercrime is rampant in every cor...