Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
320×100
970x120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
The Intel 386 processor turns 40: the 32-bit era began
Di Redazione RHC - 20/10/2025

October 20, 2025, marks a significant anniversary in the history of computing: the Intel 80386 processor, also known as the i386 , celebrates its 40th birthday . And it’s a big birthday! Launche...

Immagine del sito
Intel releases urgent patches for new Spectre variant
Di Redazione RHC - 19/10/2025

VUSec researchers have presented a paper titled “Training Solo,” which challenges the fundamental principles of protection against Spectre-v2 attacks. Previously , the domain isolation mec...

Immagine del sito
Famous hackers: Vladimir Levin and the first online bank robbery.
Di Redazione RHC - 18/10/2025

Today we’ll meet another hacker from the past. He’s Vladimir Levin, a Russian hacker from St. Petersburg (Владимир Леонидович Левин), who became famous for breaking ...

Immagine del sito
Cyber Attack on European Airports: Everest Ransomware Claims Claim
Di Redazione RHC - 18/10/2025

On September 20, we reported on a cyberattack that paralyzed several European airports, including Brussels, Berlin, and London Heathrow. This was a supply chain attack that exploited the compromise of...

Immagine del sito
Inmates hack prison: sentences reduced, funds transferred, and unauthorized visits
Di Redazione RHC - 18/10/2025

The Romanian penitentiary system has found itself at the center of a major digital scandal: inmates in Târgu Jiu hacked the PNA’s internal platform and, for several months, managed data on pris...

What is Phishing as a Service (PaaS). Let’s explore cybercrime services and access some underground resources.

"Phishing as a service" (PaaS) is a type of service offered by cybercriminals or illicit service providers that simplifies and automates the entire pr...
Redazione RHC - 20/07/2025 - 10:49

What is a False Flag in Cybersecurity: From its Origins to Its Use in Malware and National Security Attacks

In the vast world of cybersecurity, an often controversial and highly intriguing practice is that of "false flags." This term, originally used in ...
Redazione RHC - 20/07/2025 - 10:48

Chinese humanoid robot replaces its own battery and works 24 hours a day

The presentation of the Walker S2 represents a major step forward in the operational autonomy of humanoid robots. Thanks to the ability to autonomousl...
Redazione RHC - 20/07/2025 - 10:44

Gmail introduces Shielded Email. Temporary email to fight spam and protect your privacy.

Google continues to actively develop Gmail, adding new features with elements of artificial intelligence to the email service. These updates make usin...
Redazione RHC - 19/07/2025 - 21:21

Google files suit against the BadBox2.0 botnet! A thought-provoking lawsuit against unknown individuals

Google has filed a lawsuit against the anonymous operators of the Android BadBox 2.0 botnet, accusing them of orchestrating a global fraud targeting t...
Redazione RHC - 19/07/2025 - 13:52

Jen-Hsun Huang: “I was born Chinese and became Chinese-American.” The ban on AI chips in China is a grave mistake.

According to Fast Technology on July 18, Jen-Hsun Huang told Chinese media about his origins, explaining that he was born Chinese and then became Chin...
Redazione RHC - 19/07/2025 - 13:52

What is Phishing as a Service (PaaS). Let’s explore cybercrime services and access some underground resources.

- July 20th, 2025

"Phishing as a service" (PaaS) is a type of service offered by cybercriminals or illicit service providers that simplifies and automates the entire process of creating and distributing phishing attacks...

Facebook Linkedin X

What is a False Flag in Cybersecurity: From its Origins to Its Use in Malware and National Security Attacks

- July 20th, 2025

In the vast world of cybersecurity, an often controversial and highly intriguing practice is that of "false flags." This term, originally used in the context of military operations and intelligence,...

Facebook Linkedin X

Chinese humanoid robot replaces its own battery and works 24 hours a day

- July 20th, 2025

The presentation of the Walker S2 represents a major step forward in the operational autonomy of humanoid robots. Thanks to the ability to autonomously replace its own battery, the robot...

Facebook Linkedin X

Gmail introduces Shielded Email. Temporary email to fight spam and protect your privacy.

- July 19th, 2025

Google continues to actively develop Gmail, adding new features with elements of artificial intelligence to the email service. These updates make using email more convenient, but at the same time,...

Facebook Linkedin X

Google files suit against the BadBox2.0 botnet! A thought-provoking lawsuit against unknown individuals

- July 19th, 2025

Google has filed a lawsuit against the anonymous operators of the Android BadBox 2.0 botnet, accusing them of orchestrating a global fraud targeting the company's advertising platforms. BadBox is Android...

Facebook Linkedin X

Jen-Hsun Huang: “I was born Chinese and became Chinese-American.” The ban on AI chips in China is a grave mistake.

- July 19th, 2025

According to Fast Technology on July 18, Jen-Hsun Huang told Chinese media about his origins, explaining that he was born Chinese and then became Chinese-American. He emphasized how China is...

Facebook Linkedin X
Most Read Articles of the Month Most Read Articles of the Week
  1. The Truth About Windows XP License Key: FCKGW-RHQQ2-YXRKT-8TG6W-2B7Q8
  2. Computer science graduates with no future! Thousands of resumes ignored, and goodbye to six-figure salaries.
  3. With 50 dollars and physical access to the server, the Cloud goes to hell
  4. Shocking collapse: -71% of job offers for software engineers in three years
  5. Hackers hit the United States: critical federal infrastructure compromised
  1. WhatsApp Web in the crosshairs! How the worm that distributes the banking Trojan works
  2. “Double Bind” Leads to GPT-5 Jailbreak: The AI That Was Convinced It Was Schizophrenic
  3. F5 Suffers Security Breach: Source Code and Sensitive Data Stolen
  4. DAS: The world’s ear hidden in submarine cables
  5. ChatGPT writes the perfect scam… but the scammer leaves the AI instructions inside.

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE