Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
320x100 Itcentric
Fortinet 970x120px

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Intel releases urgent patches for new Spectre variant
Di Redazione RHC - 19/10/2025

VUSec researchers have presented a paper titled “Training Solo,” which challenges the fundamental principles of protection against Spectre-v2 attacks. Previously , the domain isolation mec...

Immagine del sito
Famous hackers: Vladimir Levin and the first online bank robbery.
Di Redazione RHC - 18/10/2025

Today we’ll meet another hacker from the past. He’s Vladimir Levin, a Russian hacker from St. Petersburg (Владимир Леонидович Левин), who became famous for breaking ...

Immagine del sito
Cyber Attack on European Airports: Everest Ransomware Claims Claim
Di Redazione RHC - 18/10/2025

On September 20, we reported on a cyberattack that paralyzed several European airports, including Brussels, Berlin, and London Heathrow. This was a supply chain attack that exploited the compromise of...

Immagine del sito
Inmates hack prison: sentences reduced, funds transferred, and unauthorized visits
Di Redazione RHC - 18/10/2025

The Romanian penitentiary system has found itself at the center of a major digital scandal: inmates in Târgu Jiu hacked the PNA’s internal platform and, for several months, managed data on pris...

Immagine del sito
WiFi: From Marconi’s Origins to the Wireless Network We Know Today
Di RedWave Team - 18/10/2025

Today, we live in a world where WiFi is a fundamental necessity, but how did this technology, now taken for granted, come about? How did it then develop into the network we now use every day? In this ...

Xlibre and Wayback: Two Linux Projects Clash Over X.org’s Legacy

The Linux ecosystem is once again in the spotlight, with a fork of the good old X.org taking center stage. The new project, called Xlibre, was launche...
Redazione RHC - 17/07/2025 - 08:10

A study shows a shocking truth: 98.5% of passwords are weak!

In a new analysis based on 10 million compromised passwords, Specops has demonstrated how vulnerable corporate networks remain to human error. All pas...
Redazione RHC - 16/07/2025 - 17:39

Operation Eastwood: Pro-Russian hacker group NoName057(16) dismantled

As part of the investigations conducted by the Rome Public Prosecutor's Office and coordinated by the National Anti-Mafia and Anti-Terrorism Directora...
Redazione RHC - 16/07/2025 - 14:31

What is Doxing and How Can It Change Your Online Life?

Doxing (short for "dropping dox," sometimes written as Doxxing) is the act of revealing personal information about someone online, such as their real ...
Redazione RHC - 16/07/2025 - 11:32

What are Botnets? A Journey Through Malware, Cyber Threat Intelligence, and OSINT

The Internet provides a sea of information. We often talk on RHC about Open Source Intelligence (OSINT) and Cyber Threat Intelligence (CTI), i.e. thos...
Redazione RHC - 16/07/2025 - 11:25

What is a zero-day and the risk of targeted cyber attacks

Zero-day vulnerabilities are one of the greatest cybersecurity risks for organizations. These are unknown and unpatched vulnerabilities that attackers...
Redazione RHC - 16/07/2025 - 11:05

Xlibre and Wayback: Two Linux Projects Clash Over X.org’s Legacy

- July 17th, 2025

The Linux ecosystem is once again in the spotlight, with a fork of the good old X.org taking center stage. The new project, called Xlibre, was launched by German developer...

Facebook Linkedin X

A study shows a shocking truth: 98.5% of passwords are weak!

- July 16th, 2025

In a new analysis based on 10 million compromised passwords, Specops has demonstrated how vulnerable corporate networks remain to human error. All passwords were extracted from a list of over...

Facebook Linkedin X

Operation Eastwood: Pro-Russian hacker group NoName057(16) dismantled

- July 16th, 2025

As part of the investigations conducted by the Rome Public Prosecutor's Office and coordinated by the National Anti-Mafia and Anti-Terrorism Directorate, the Postal Police has completed important investigative activities in...

Facebook Linkedin X

What is Doxing and How Can It Change Your Online Life?

- July 16th, 2025

Doxing (short for "dropping dox," sometimes written as Doxxing) is the act of revealing personal information about someone online, such as their real name, home address, workplace, phone number, financial...

Facebook Linkedin X

What are Botnets? A Journey Through Malware, Cyber Threat Intelligence, and OSINT

- July 16th, 2025

The Internet provides a sea of information. We often talk on RHC about Open Source Intelligence (OSINT) and Cyber Threat Intelligence (CTI), i.e. those intelligence disciplines that deal with the...

Facebook Linkedin X

What is a zero-day and the risk of targeted cyber attacks

- July 16th, 2025

Zero-day vulnerabilities are one of the greatest cybersecurity risks for organizations. These are unknown and unpatched vulnerabilities that attackers exploit to penetrate computer systems and compromise data security. In this...

Facebook Linkedin X
Most Read Articles of the Month Most Read Articles of the Week
  1. The Truth About Windows XP License Key: FCKGW-RHQQ2-YXRKT-8TG6W-2B7Q8
  2. Computer science graduates with no future! Thousands of resumes ignored, and goodbye to six-figure salaries.
  3. With 50 dollars and physical access to the server, the Cloud goes to hell
  4. Shocking collapse: -71% of job offers for software engineers in three years
  5. Hackers hit the United States: critical federal infrastructure compromised
  1. WhatsApp Web in the crosshairs! How the worm that distributes the banking Trojan works
  2. “Double Bind” Leads to GPT-5 Jailbreak: The AI That Was Convinced It Was Schizophrenic
  3. F5 Suffers Security Breach: Source Code and Sensitive Data Stolen
  4. DAS: The world’s ear hidden in submarine cables
  5. Electricians and plumbers: They are the real winners of the AI boom

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE