Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Red Hot Cyber Conference 2026: Sponsorships Open for the Fifth Edition in Rome
Di Redazione RHC - 04/09/2025

The Red Hot Cyber Conference has become a regular event for the Red Hot Cyber community and for anyone working in or interested in the world of digital technologies and cybersecurity. The fifth editio...

Hexstrike AI unleashes chaos! Zero-days exploited in record time
Di Redazione RHC - 04/09/2025

The release of Hexstrike-AI marks a turning point in the cybersecurity landscape. The framework, billed as a next-generation tool for red teams and researchers, is capable of orchestrating over 150 sp...

LockBit 5.0: Signs of a New and Possible “Rebirth”?
Di Pietro Melillo - 03/09/2025

LockBit represents one of the longest-running and most structured ransomware gangs of recent years, with a Ransomware-as-a-Service (RaaS) model that has profoundly impacted the criminal ecosystem. Fol...

The KING of DDoS! Cloudflare blocks a monstrous 11.5 terabit-per-second attack.
Di Redazione RHC - 03/09/2025

The record for the largest DDoS attack ever recorded in June 2025 has already been broken. Cloudflare said it recently blocked the largest DDoS attack in history, which peaked at 11.5 Tbps. “Cloudfl...

Palo Alto Networks Also Compromised via Salesforce and Drift
Di Antonio Piazzolla - 02/09/2025

In early September 2025, Palo Alto Networks confirmed it had been the victim of a data breach. The compromise did not affect its core products or services, but rather some internally used Salesforce i...

Scam Alert: How I Almost Fell for a Million-Dollar

My name is Elena and I am a 35-year-old housewife. One day, while I was checking my email, I found a mail that caught my attention. The sender introdu...
Antonio Piovesan - 09/03/2024 - 22:22

The First Message Sent in the History of the Internet

Original Publication Date: Massimiliano Brolli, 25 September 2021 Today, exchanging a message through WhatsApp or Skype is a normal gesture, part o...
Tara Lie - 22/02/2024 - 18:25

HijackLoader Expands Techniques to Improve Defense Evasion 

Donato Onofri e Emanuele Calvelli Endpoint Security & XDR CrowdStrike. HijackLoader continues to become increasingly popular among adversaries...
Redazione RHC - 22/02/2024 - 12:11

The Deception of the Wallet: A Journey into the World of Scammers

Giorgio sat in the self-help circle, the dim candlelight dancing on the walls. The eyes of the other participants were fixed on him, waiting for him t...
Antonio Piovesan - 16/02/2024 - 20:45

Ghost Exodus: the story of a hacker in a documentary that has a lot to teach

Ghost Exodus through the exclusive documentary “How Hacking Ruined My Life: Ghost Exodus Story” produced by Silva Rindzevi and visible on the CyberNew...
Olivia Terragni - 29/11/2023 - 07:00

Signal towards the Future: Post Quantum Cryptography now protects our messages

Translator: Tara Lie Signal has announced that it has improved encryption within its messenger application. Its end-to-end communication protoco...
Tara Lie - 25/09/2023 - 14:06

Underwater cables and the “cyber war of the seabed”. Between control, geopolitics and technology.

- July 8th, 2025

Author: 5ar0m4n Publishing Date: 11/7/2021 We have often addressed the topic of undersea cables on RHC where we talked about the first submarine cable in history and the last one...

  

Pig Butchering Scam: How Pig Slaughter Is Becoming an Emotional Addiction Scam

- July 8th, 2025

In the interconnected labyrinth of the 21st century, where the desire for authenticity and the search for opportunity dance on the edge of paradox, a dark phenomenon emerges that challenges...

  

A new Poc Exploit allows Privilege Excalation on Linux using the udisksd daemon

- July 8th, 2025

A proof-of-concept (PoC) exploit for a critical vulnerability that allows local privilege escalation has been developed, affecting several major Linux distributions, such as Fedora and SUSE. The vulnerability, tracked as...

  

Critical Vulnerabilities in SMBClient for macOS. 9.8 out of 10 for Effective RCE

- July 8th, 2025

Experts have identified serious vulnerabilities in SMBClient for macOS that affect both user space and the operating system kernel. These vulnerabilities potentially allow remote execution of arbitrary code and disruption...

  

Sign up for the newsletter