Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Salesloft Cyber Attack: Chatbot Drift Temporarily Disabled
Di Redazione RHC - 07/09/2025

Salesloft announced that it would temporarily deactivate its AI-powered chatbot Drift on September 5, after several companies were hit by a massive supply chain attack. The incident resulted in the ma...

Discover the Dark Web: Access, Secrets, and Helpful Links to the Onion Network
Di Redazione RHC - 06/09/2025

The Dark Web is a part of the internet that cannot be reached with standard browsers (Chrome, Firefox, Edge). To access it, you need to use specific tools like the Tor Browser, which guarantees anonym...

AI A2 detected 102 0-day bugs and created exploits in Android apps for $1.77
Di Redazione RHC - 06/09/2025

Artificial intelligence systems have been criticized for creating confusing vulnerability reports and inundating open-source developers with irrelevant complaints. But researchers at Nanjing Universit...

$16 billion in stolen Apple, Meta, and Google credentials up for sale for $121,000
Di Redazione RHC - 05/09/2025

The Darklab team, Red Hot Cyber‘s community of threat intelligence experts, has identified an ad on the dark web marketplace “Tor Amazon”, the criminal counterpart of the popular e-commerce site...

Red Hot Cyber Conference 2026: Sponsorships Open for the Fifth Edition in Rome
Di Redazione RHC - 04/09/2025

The Red Hot Cyber Conference has become a regular event for the Red Hot Cyber community and for anyone working in or interested in the world of digital technologies and cybersecurity. The fifth editio...

Cybercriminals exploit ARC popularity to spread Poseidon Malware : Mac users are the target!

In teh last months Mac users have been targeted by a new wave of cyberattack trough malvertising campaigns. The last threat, called “Poseidon” by thei...
Raffaela Crisci - 01/07/2024 - 16:37

Possible Data Breach Affecting TÜV Rheinland AG

Recently, TÜV Rheinland AG, one of the leading global certification and inspection companies, has appeared on the data leak site of the ransomware gro...
Pietro Melillo - 01/07/2024 - 16:27

Juniper Networks Releases Security Updates for a Critical 10.0 Vulnerability

Juniper Networks has recently announced the release of out-of-band security updates to address a severe vulnerability that could lead to an authentica...
Pietro Melillo - 01/07/2024 - 08:45

Allegedly Data Breach: Kemenkumham Email Credentials Compromised

A significant data breach has involved the Ministry of Law and Human Rights (Kemenkumham) in Indonesia. According to a post on a hacker forum, ...
Pietro Melillo - 01/07/2024 - 08:23

Coinbase USA: Threat Actor Claims to Sell Database of 600,000 Users

In the past few hours, a new and alarming cyber threat has emerged. A threat actor has claimed to possess and intends to sell a database containing in...
Pietro Melillo - 01/07/2024 - 08:17

A Brief History of Artificial Intelligence: From Alan Turing to Generative AI

Artificial Intelligence (AI) is in the Spotlight Today, Generating Unprecedented Interest and Debate. However, it's important to recognize that this r...
Redazione RHC - 30/06/2024 - 22:47

Cybercriminals exploit ARC popularity to spread Poseidon Malware : Mac users are the target!

- July 1st, 2024

In teh last months Mac users have been targeted by a new wave of cyberattack trough malvertising campaigns. The last threat, called “Poseidon” by their creators, has been revealed this...

  

Possible Data Breach Affecting TÜV Rheinland AG

- July 1st, 2024

Recently, TÜV Rheinland AG, one of the leading global certification and inspection companies, has appeared on the data leak site of the ransomware group RansomEXX. At present, there are no...

  

Juniper Networks Releases Security Updates for a Critical 10.0 Vulnerability

- July 1st, 2024

Juniper Networks has recently announced the release of out-of-band security updates to address a severe vulnerability that could lead to an authentication bypass in some of its routers. This vulnerability,...

  

Allegedly Data Breach: Kemenkumham Email Credentials Compromised

- July 1st, 2024

A significant data breach has involved the Ministry of Law and Human Rights (Kemenkumham) in Indonesia. According to a post on a hacker forum, a threat actor under the pseudonym...

  

Coinbase USA: Threat Actor Claims to Sell Database of 600,000 Users

- July 1st, 2024

In the past few hours, a new and alarming cyber threat has emerged. A threat actor has claimed to possess and intends to sell a database containing information on 600,000...

  

A Brief History of Artificial Intelligence: From Alan Turing to Generative AI

- June 30th, 2024

Artificial Intelligence (AI) is in the Spotlight Today, Generating Unprecedented Interest and Debate. However, it's important to recognize that this revolutionary technology has a rich history spanning over seventy years...

  

Sign up for the newsletter