Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Fortinet 320x100px
Enterprise BusinessLog 970x120 1

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Nessun autore trovato con i filtri selezionati.

Ultimi articoli di Redazione RHC

A new Poc Exploit allows Privilege Excalation on Linux using the udisksd daemon
A proof-of-concept (PoC) exploit for a critical vulnerability that allows local privilege escalation has been developed, affecting several major Linux...
Critical Vulnerabilities in SMBClient for macOS. 9.8 out of 10 for Effective RCE
Experts have identified serious vulnerabilities in SMBClient for macOS that affect both user space and the operating system kernel. These vulnerabilit...
Discovering Drumrlu. The IaB that does big business between Türkiye and Venezuela
After the Far East and Iran, we continue our series of articles on IAB actors with an actor believed to be based in Europe, in a NATO country. Origin ...
Human Replatforming! Artificial Intelligence Threatens Half of Jobs
The chairman of the American car company Ford, Jim Farley, has released a statement sharp on the future of the job market in the age of artificial int...
123 Stealer is coming! $120 a month subscription to steal any confidential data
A new infostealer emerges from the criminal underground and its name is “123 | Stealer”. The author of this software is a hacker who hides under t...
Pig Butchering Scam: How Pig Slaughter Is Becoming an Emotional Addiction Scam
In the interconnected labyrinth of the 21st century, where the desire for authenticity and the search for opportunity dance on the edge of paradox, a ...
He’s 13 and Hacked Microsoft Teams! The Story of Dylan, One of the Youngest Bug Hunters
At just 13 years old, Dylan became the youngest security researcher to collaborate with the Microsoft Security Response Center (MSRC), demonstrating h...
He’s 13 and Hacked Microsoft Teams! The Story of Dylan, One of the Youngest Bug Hunters
At just 13 years old, Dylan became the youngest security researcher to collaborate with the Microsoft Security Response Center (MSRC), demonstrating h...
Discovering the Jargon File! The Living Relic of Hacker Culture
Jargon File version 4.4.7 Today I would like to talk to you about a very old computer document, containing a piece of everyone’s hacker and computer...
The History of Email. How This Invention Impacted the Modern Era
Email was in fact the first of those disruptive revolutions that catapulted the world into the era of networks and the Internet. Thinking about office...
The “Declaration of Independence of Cyberspace”
“Governments of the World, weary giants of flesh and steel, I come from Cyberspace, the new home of the Mind. On behalf of the future, I ask you, be...
Satoshi Nakamoto: Discover the Mysterious Inventor of Bitcoin.
The true identity of the creator of Bitcoin is one of the biggest mysteries in the tech world. Over the years, many theories have emerged about who Sa...
After Encrypting Half the World, Hunters International Shuts Down! Decryptor Distributed for Free
Hunters International, the group responsible for one of the largest ransomware attacks in recent years, has officially announced the cessation of its ...
DarkForums Takes Over BreachForums’ Telegram Channel “The Jacuzzi”
The underground landscape of cybercriminal forums continues to evolve and is changing. With an official announcement published on June 25, 2025 both o...
Patch Chaos: Windows 11 Update Breaks PDF Printing
Yes, once again a Windows update has unleashed hell. The harmless “Microsoft Print to PDF” function, a silent ally of users and IT administrators ...
The symbol of the hacker community: today we talk about the Glider.
The hacker culture is a fascinating subject. It is a rich mine of outlandish innovation, genius and intuition. Of bizarre characters, of fatalistic hu...
The hacker group LOpht predicted the future of the Internet in 1998, but the US didn’t listen to them.
“If you’re looking for computer security, then the Internet is not the place to be.” Said Mudge, then 27, with the look of a biblical prophet wi...
Linux Pwned! Privilege Escalation on SUDO in 5 seconds. HackerHood tests the CVE-2025-32463 exploit
Yesterday, Red Hot Cyber published an in-depth analysis of a gserious vulnerability discovered in SUDO (CVE-2025-32463), which allows escalation of pr...
North Korean Hackers on the Payroll: How Companies Paid Salaries to North Korean IT Specialists
The US Department of Justice has announced the discovery ofa large-scale scheme in which fake IT specialists from the DPRK obtained jobs at American c...
Do you really know what Hacktivism means? It’s a “special message of hope!”
“Hacktivism, a special message of hope.” Thus begins the “Hacktivism Declaration”, published on July 4, 2001 by the famous hacker group Cult o...