Red Hot Cyber. The Cybersecurity Blog
Salesloft Cyber Attack: Chatbot Drift Temporarily Disabled
Salesloft announced that it would temporarily deactivate its AI-powered chatbot Drift on September 5, after several companies were hit by a massive supply chain attack. The incident resulted in the ma...
Discover the Dark Web: Access, Secrets, and Helpful Links to the Onion Network
The Dark Web is a part of the internet that cannot be reached with standard browsers (Chrome, Firefox, Edge). To access it, you need to use specific tools like the Tor Browser, which guarantees anonym...
AI A2 detected 102 0-day bugs and created exploits in Android apps for $1.77
Artificial intelligence systems have been criticized for creating confusing vulnerability reports and inundating open-source developers with irrelevant complaints. But researchers at Nanjing Universit...
$16 billion in stolen Apple, Meta, and Google credentials up for sale for $121,000
The Darklab team, Red Hot Cyber‘s community of threat intelligence experts, has identified an ad on the dark web marketplace “Tor Amazon”, the criminal counterpart of the popular e-commerce site on th...
Red Hot Cyber Conference 2026: Sponsorships Open for the Fifth Edition in Rome
The Red Hot Cyber Conference has become a regular event for the Red Hot Cyber community and for anyone working in or interested in the world of digital technologies and cybersecurity. The fifth editio...
Hexstrike AI unleashes chaos! Zero-days exploited in record time
The release of Hexstrike-AI marks a turning point in the cybersecurity landscape. The framework, billed as a next-generation tool for red teams and researchers, is capable of orchestrating over 150 sp...
LockBit 5.0: Signs of a New and Possible “Rebirth”?
LockBit represents one of the longest-running and most structured ransomware gangs of recent years, with a Ransomware-as-a-Service (RaaS) model that has profoundly impacted the criminal ecosystem. Fol...
The KING of DDoS! Cloudflare blocks a monstrous 11.5 terabit-per-second attack.
The record for the largest DDoS attack ever recorded in June 2025 has already been broken. Cloudflare said it recently blocked the largest DDoS attack in history, which peaked at 11.5 Tbps. “Cloudflar...
Palo Alto Networks Also Compromised via Salesforce and Drift
In early September 2025, Palo Alto Networks confirmed it had been the victim of a data breach. The compromise did not affect its core products or services, but rather some internally used Salesforce i...
Was there terror on Ursula von der Leyen’s flight? Let’s clear things up!
On August 31, 2025, flight AAB53G, operated by a Dassault Falcon 900LX registered OO-GPE and carrying European Commission President Ursula von der Leyen, took off from Warsaw and landed safely at Plov...
Featured Articles

Salesloft announced that it would temporarily deactivate its AI-powered chatbot Drift on September 5, after several companies were hit by a massive supply chain attack. The incident resulted in the ma...

The Dark Web is a part of the internet that cannot be reached with standard browsers (Chrome, Firefox, Edge). To access it, you need to use specific tools like the Tor Browser, which guarantees anonym...

Artificial intelligence systems have been criticized for creating confusing vulnerability reports and inundating open-source developers with irrelevant complaints. But researchers at Nanjing Universit...

The Darklab team, Red Hot Cyber‘s community of threat intelligence experts, has identified an ad on the dark web marketplace “Tor Amazon”, the criminal counterpart of the popular e-commerce site...

The Red Hot Cyber Conference has become a regular event for the Red Hot Cyber community and for anyone working in or interested in the world of digital technologies and cybersecurity. The fifth editio...
Likely Iranian-Origin Phishing Attack: New Threat to Online Security in Italy!
Hunting Hydra: ETA-W1nterSt0rm #OpChildSafety discovers a huge CSAM network
Discovering the Traffic Light Protocol (TLP). How to exchange sensitive information
Discover Quantum Computing
How CDNs can save your website: Speed and security at the highest level
Mathematics Meets Programming: A transformation journey

Likely Iranian-Origin Phishing Attack: New Threat to Online Security in Italy!
Davide Cavallini - April 4th, 2024
In the vast landscape of computing, increasingly insidious threats emerge that jeopardize the online security of both companies and ordinary users. In this context, phishing attacks represent one of the...

Hunting Hydra: ETA-W1nterSt0rm #OpChildSafety discovers a huge CSAM network
Olivia Terragni - April 2nd, 2024
#OpChildSafety: just as in every story, there is always more than what a reader or a spectator can see and above all know. This is a story is about the...

Discovering the Traffic Light Protocol (TLP). How to exchange sensitive information
Antonio Piovesan - March 25th, 2024
Author: Massimiliano Brolli - March, 5th 2024 07:23English translation: Antonio Piovesan - March, 11th 2024 How can we ensure that sensitive data is exchanged securely and efficiently? As answer to...

Discover Quantum Computing
Tara Lie - March 20th, 2024
Welcome to the Red Hot Cyber community’s Quantum Technology Group page. The themed group will be lead by industry experts, and will focus on the dissemination and the study of...

How CDNs can save your website: Speed and security at the highest level
Antonio Piovesan - March 18th, 2024
Let's talk a bit about CDNs, or Content Delivery Networks, and how they can be real digital lifesavers. Imagine being in a crowded restaurant. There's only one waiter running around...

Mathematics Meets Programming: A transformation journey
Davide Cavallini - March 11th, 2024
Discover the Magic of Programming Through the Charm of Mathematics: A Journey of Growth and Learning Good morning everyone, I’m Davide Cavallini, Senior Programmer and Penetration Tester This article was written...
Sign up for the newsletter