Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Fortinet 970x120px
Precedente Successivo

Latest news

An e-cigarette becomes a web server. And let hacking be! Cyber News

An e-cigarette becomes a web server. And let hacking be!

Richard Stallman said many years ago "Playfully doing something difficult, whether it's useful or not, that's hacking!" Romanian engineer and...
Manuel Roccon - September 16, 2025
Security alert for AI servers: thousands are at risk Cyber News

Security alert for AI servers: thousands are at risk

Artificial intelligence systems are increasingly under attack. This data emerges from "Trend Micro State of AI Security Report, 1H 2025"....
Luca Vinciguerra - September 16, 2025
Plato, the cave, and social media: are we only looking at shadows? Cybercrime

Plato, the cave, and social media: are we only looking at shadows?

The famous Socratic precept "Know thyself" has never been more relevant. Today, our digital identity is a fragmented mosaic of...
Daniela Farina - September 16, 2025
Vibe coding, yes, but be careful. Speed doesn’t always beat quality. Cyber News

Vibe coding, yes, but be careful. Speed doesn’t always beat quality.

There's a new phenomenon in the programming industry: vibe coding. Developers are increasingly using artificial intelligence agents to speed up...
Silvia Felici - September 16, 2025
The Great Firewall in the Spotlight: The Leak Revealing the Industrialization of Chinese Censorship Cyber News

The Great Firewall in the Spotlight: The Leak Revealing the Industrialization of Chinese Censorship

Edited by Luca Stivali and Olivia Terragni. On September 11, 2025, what can be defined as the largest leak ever...
Silvia Felici - September 16, 2025
Jaguar Land Rover cyberattack leaves $50 million in losses Cyber News

Jaguar Land Rover cyberattack leaves $50 million in losses

The cyber attack on Jaguar Land Rover, which paralyzed the company's operations, has become one of the most serious crises...
Redazione RHC - September 16, 2025

Mathematics Meets Programming: A transformation journey

Discover the Magic of Programming Through the Charm of Mathematics: A Journey of Growth and Learning Good morning everyone, I’m Davide Cavallini, Senior Programmer and Penetration Tester  This article was written...

Scam Alert: How I Almost Fell for a Million-Dollar

My name is Elena and I am a 35-year-old housewife. One day, while I was checking my email, I found a mail that caught my attention. The sender introduced himself...

HijackLoader Expands Techniques to Improve Defense Evasion 

Donato Onofri e Emanuele Calvelli Endpoint Security & XDR CrowdStrike. HijackLoader continues to become increasingly popular among adversaries for deploying additional payloads and tooling A recent HijackLoader variant employs sophisticated techniques to...

The Deception of the Wallet: A Journey into the World of Scammers

Giorgio sat in the self-help circle, the dim candlelight dancing on the walls. The eyes of the other participants were fixed on him, waiting for him to speak. It was...

Signal towards the Future: Post Quantum Cryptography now protects our messages

Translator: Tara Lie Signal has announced that it has improved encryption within its messenger application. Its end-to-end communication protocol now uses quantum-resistant cryptographic keys, making it resistant to future attacks...

Unveiling the Dark Secrets of Sql Injection Attacks – Learn How to Protect Your Data!

Good morning everyone. I am Davide Cavallini, a Senior Laravel Developer and Penetration Tester. Today, I will talk to you about injections. There are various types, but what does it...

RHC interviews 8base: The cybergang that provides the security AUDIT report to the hacked company

A few days ago we published an article on the new cybergang 8Base. 8base define themselves as “honest and simple pentesters. We offer companies the most loyal conditions for returning...

Taking cyberattacks seriously: the (likely) Albanian cyber aggression and the Iranian responsibility

Annita Larissa Sciacovelli, docente di Diritto internazionale, Università degli Studi di Bari, AB European Agency for cybersecurity – ENISA (pubblicato su Newsletter SIOI, Osservatorio sulle attività delle Organizzazioni Internazionali e...

The History of the Unix Operating System (Part 2)

Author: Carlo DenzaOriginal Publication Date: 07/10/2021Translator: Tara Lie Star Trek IV - The Voyage Home, directed by Leonard Nimoy (USA, 1986, Paramount Pictures): “The starship ‘U.S.S. Enterprise NCC-1701’ and its...

The History of the UNIX operating system (Part 1)

Author: Carlo DenzaOriginal Publication Date: 12/12/2020Translator: Tara Lie This article discusses the history of the Unix operating system (OS), a miracle of modern technology. This OS is used across the world, and is...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE