Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

Red Hot Cyber. The Cybersecurity Blog

- July 3rd, 2025 - (Posted in Hacking revolution)
The hacker culture is a fascinating subject. It is a rich mine of outlandish innovation, genius and intuition. Of bizarre characters, of fatalistic humor, of memes, but above all culture, engineering and science. But while Linux has its penguin, BSD has its daemon and Perl His camel, what has always...

Akira Ransomware: The New Threat Using Webcams as Entry Points

Akira represents one of the most recent ransomware threats capable of bypassing traditional organizational defense mechanisms. A recent case analyzed by the S-RM team highlighted how this group leveraged an unprotected webcam to deploy its payload, evading the defenses of

Analysis of Recorded Future’s CVE Report – February 2025

The monthly Recorded Future CVE report for February 2025 provides a detailed overview of current cybersecurity threats, highlighting a slight decline compared to the previous month. A total of 25 high-impact vulnerabilities were identified, down from 33 in January, yet

Your VPN is a Trojan! Here are 17 Free Apps Made in China That Spy on You While Google and Apple Get Fat

- June 23rd, 2025

"If you don't pay for the service, you are the product. This is true for social networks, but also for free VPNs: your data, your privacy, is often the real...

  

sicari a pagamento

Murders Like a Drink! Dark Web Recruits Kids With Encrypted Apps in Europe

- June 23rd, 2025

A worrying criminal trend is taking hold in Europe: criminal gangs are using encrypted apps to recruit teenagers as young as 14 to commit violent crimes, including contract killings. These...

  

Fumetto sul cyberbullismo di Red Hot Cyber

“Byte The Silence”: RHC’s Free Shock Comic About Cyberbullying Out Today!

- June 23rd, 2025

Today, June 23, 2025, "Byte The Silence" is released, the new comic about cyberbullying created by Red Hot Cyber, is available from today for free in electronic format, on our...

  

FortiGate Under Attack: Tools for Mass Exploitation of Exposed APIs for Sale

- June 23rd, 2025

A new and alarming development is shaking up the cybersecurity landscape: a malicious actor has advertised on the dark web a highly sophisticated exploit aimed at compromising FortiGate devices. A...

  

Sign up for the newsletter