Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
TM RedHotCyber 320x100 042514
UtiliaCS 970x120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
The Intel 386 processor turns 40: the 32-bit era began
Di Redazione RHC - 20/10/2025

October 20, 2025, marks a significant anniversary in the history of computing: the Intel 80386 processor, also known as the i386 , celebrates its 40th birthday . And it’s a big birthday! Launche...

Immagine del sito
Intel releases urgent patches for new Spectre variant
Di Redazione RHC - 19/10/2025

VUSec researchers have presented a paper titled “Training Solo,” which challenges the fundamental principles of protection against Spectre-v2 attacks. Previously , the domain isolation mec...

Immagine del sito
Famous hackers: Vladimir Levin and the first online bank robbery.
Di Redazione RHC - 18/10/2025

Today we’ll meet another hacker from the past. He’s Vladimir Levin, a Russian hacker from St. Petersburg (Владимир Леонидович Левин), who became famous for breaking ...

Immagine del sito
Cyber Attack on European Airports: Everest Ransomware Claims Claim
Di Redazione RHC - 18/10/2025

On September 20, we reported on a cyberattack that paralyzed several European airports, including Brussels, Berlin, and London Heathrow. This was a supply chain attack that exploited the compromise of...

Immagine del sito
Inmates hack prison: sentences reduced, funds transferred, and unauthorized visits
Di Redazione RHC - 18/10/2025

The Romanian penitentiary system has found itself at the center of a major digital scandal: inmates in Târgu Jiu hacked the PNA’s internal platform and, for several months, managed data on pris...

Three score 10 bugs have been detected in Cisco ISE and ISE-PIC: urgent updates required.

Several vulnerabilities have been identified in the Cisco Identity Services Engine (ISE) and Cisco ISE Passive Identity Connector (ISE-PIC) products t...
Redazione RHC - 18/07/2025 - 07:41

OMGCable: The Thin Red Line Between Penetration Testing and Covert Surveillance

In 2021, during one of my explorations into the increasingly blurred boundary between hardware and cybersecurity, I wrote an article with a title that...
Redazione RHC - 17/07/2025 - 16:12

Live Ransomware Attack Video! HackerHood’s Workshop for Omnia and WithSecure

HackerHood, Red Hot Cyber's team of ethical hackers, has created something rarely seen outside of the most exclusive conferences: a live workshop demo...
Redazione RHC - 17/07/2025 - 13:56

Google Chrome emergency fix for critical bug that leads to sandbox escape

Google has released an emergency update for the Chrome browser, simultaneously eliminating six vulnerabilities, one of which is already actively explo...
Redazione RHC - 17/07/2025 - 12:31

Inside Operation Eastwood: The Shadows of Cyberterrorism and Propaganda

The international "Eastwood" operation represents a watershed moment in the fight against cyberterrorism. For the first time, a coordinated global ope...
Redazione RHC - 17/07/2025 - 10:48

More and more malware is hiding in DNS records. The new frontier is also for AI.

Hackers have learned to hide malware in places where it is virtually impossible to trace: in DNS records that connect domain names to IP addresses. Th...
Redazione RHC - 17/07/2025 - 09:07

Three score 10 bugs have been detected in Cisco ISE and ISE-PIC: urgent updates required.

- July 18th, 2025

Several vulnerabilities have been identified in the Cisco Identity Services Engine (ISE) and Cisco ISE Passive Identity Connector (ISE-PIC) products that could allow a remote attacker to execute arbitrary commands...

Facebook Linkedin X

OMGCable: The Thin Red Line Between Penetration Testing and Covert Surveillance

- July 17th, 2025

In 2021, during one of my explorations into the increasingly blurred boundary between hardware and cybersecurity, I wrote an article with a title that today sounds almost prophetic: “Even a...

Facebook Linkedin X

Live Ransomware Attack Video! HackerHood’s Workshop for Omnia and WithSecure

- July 17th, 2025

HackerHood, Red Hot Cyber's team of ethical hackers, has created something rarely seen outside of the most exclusive conferences: a live workshop demonstrating, step by step, a complete ransomware attack....

Facebook Linkedin X

Google Chrome emergency fix for critical bug that leads to sandbox escape

- July 17th, 2025

Google has released an emergency update for the Chrome browser, simultaneously eliminating six vulnerabilities, one of which is already actively exploited in real-world attacks. The issue affects critical components associated...

Facebook Linkedin X

Inside Operation Eastwood: The Shadows of Cyberterrorism and Propaganda

- July 17th, 2025

The international "Eastwood" operation represents a watershed moment in the fight against cyberterrorism. For the first time, a coordinated global operation has dealt a severe blow to one of the...

Facebook Linkedin X

More and more malware is hiding in DNS records. The new frontier is also for AI.

- July 17th, 2025

Hackers have learned to hide malware in places where it is virtually impossible to trace: in DNS records that connect domain names to IP addresses. This technique allows them to...

Facebook Linkedin X
Most Read Articles of the Month Most Read Articles of the Week
  1. The Truth About Windows XP License Key: FCKGW-RHQQ2-YXRKT-8TG6W-2B7Q8
  2. Computer science graduates with no future! Thousands of resumes ignored, and goodbye to six-figure salaries.
  3. With 50 dollars and physical access to the server, the Cloud goes to hell
  4. Shocking collapse: -71% of job offers for software engineers in three years
  5. Hackers hit the United States: critical federal infrastructure compromised
  1. WhatsApp Web in the crosshairs! How the worm that distributes the banking Trojan works
  2. “Double Bind” Leads to GPT-5 Jailbreak: The AI That Was Convinced It Was Schizophrenic
  3. F5 Suffers Security Breach: Source Code and Sensitive Data Stolen
  4. DAS: The world’s ear hidden in submarine cables
  5. Electricians and plumbers: They are the real winners of the AI boom

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE