Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
320x100 Itcentric
TM RedHotCyber 970x120 042543

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Intel releases urgent patches for new Spectre variant
Di Redazione RHC - 19/10/2025

VUSec researchers have presented a paper titled “Training Solo,” which challenges the fundamental principles of protection against Spectre-v2 attacks. Previously , the domain isolation mec...

Immagine del sito
Famous hackers: Vladimir Levin and the first online bank robbery.
Di Redazione RHC - 18/10/2025

Today we’ll meet another hacker from the past. He’s Vladimir Levin, a Russian hacker from St. Petersburg (Владимир Леонидович Левин), who became famous for breaking ...

Immagine del sito
Cyber Attack on European Airports: Everest Ransomware Claims Claim
Di Redazione RHC - 18/10/2025

On September 20, we reported on a cyberattack that paralyzed several European airports, including Brussels, Berlin, and London Heathrow. This was a supply chain attack that exploited the compromise of...

Immagine del sito
Inmates hack prison: sentences reduced, funds transferred, and unauthorized visits
Di Redazione RHC - 18/10/2025

The Romanian penitentiary system has found itself at the center of a major digital scandal: inmates in Târgu Jiu hacked the PNA’s internal platform and, for several months, managed data on pris...

Immagine del sito
WiFi: From Marconi’s Origins to the Wireless Network We Know Today
Di RedWave Team - 18/10/2025

Today, we live in a world where WiFi is a fundamental necessity, but how did this technology, now taken for granted, come about? How did it then develop into the network we now use every day? In this ...

Is the end of state-led cyberspace invasions coming? The 56-page draft prepared by the UN

The eleventh final session of the Open-Ended Working Group (OEWG) on cybersecurity opened at the United Nations Headquarters in New York on July 7. Th...
Redazione RHC - 09/07/2025 - 10:50

Claude Shannon: Father of Cryptography and Founder of the Information Age

Whoever has as a mission, to deal with computer security and therefore also with cryptography, must necessarily pass through the figures of two giant...
Carlo Denza - 08/07/2025 - 09:28

“As We May Think”. The Visionary Essay of Vannevar Bush

Today I would like to bring to light a revolutionary essay, a source of inspiration for many scientists who have contributed to technological innovati...
Redazione RHC - 08/07/2025 - 09:27

Who are the most famous hackers in history?

We often talk about hackers, but who are the famous hackers that ever existed? Considered by many as eccentric geniuses and computer wizards, by ot...
Redazione RHC - 08/07/2025 - 09:21

Underwater cables and the “cyber war of the seabed”. Between control, geopolitics and technology.

Author: 5ar0m4n Publishing Date: 11/7/2021 We have often addressed the topic of undersea cables on RHC where we talked about the first submarine cabl...
Redazione RHC - 08/07/2025 - 09:20

Pig Butchering Scam: How Pig Slaughter Is Becoming an Emotional Addiction Scam

In the interconnected labyrinth of the 21st century, where the desire for authenticity and the search for opportunity dance on the edge of paradox, a ...
Redazione RHC - 08/07/2025 - 09:17

Is the end of state-led cyberspace invasions coming? The 56-page draft prepared by the UN

- July 9th, 2025

The eleventh final session of the Open-Ended Working Group (OEWG) on cybersecurity opened at the United Nations Headquarters in New York on July 7. The group was created in 2019...

Facebook Linkedin X

Claude Shannon: Father of Cryptography and Founder of the Information Age

- July 8th, 2025

Whoever has as a mission, to deal with computer security and therefore also with cryptography, must necessarily pass through the figures of two giants of the last century. We are...

Facebook Linkedin X

“As We May Think”. The Visionary Essay of Vannevar Bush

- July 8th, 2025

Today I would like to bring to light a revolutionary essay, a source of inspiration for many scientists who have contributed to technological innovation, especially in computer science in the...

Facebook Linkedin X

Who are the most famous hackers in history?

- July 8th, 2025

We often talk about hackers, but who are the famous hackers that ever existed? Considered by many as eccentric geniuses and computer wizards, by others they have the appearance of...

Facebook Linkedin X

Underwater cables and the “cyber war of the seabed”. Between control, geopolitics and technology.

- July 8th, 2025

Author: 5ar0m4n Publishing Date: 11/7/2021 We have often addressed the topic of undersea cables on RHC where we talked about the first submarine cable in history and the last one...

Facebook Linkedin X

Pig Butchering Scam: How Pig Slaughter Is Becoming an Emotional Addiction Scam

- July 8th, 2025

In the interconnected labyrinth of the 21st century, where the desire for authenticity and the search for opportunity dance on the edge of paradox, a dark phenomenon emerges that challenges...

Facebook Linkedin X
Most Read Articles of the Month Most Read Articles of the Week
  1. The Truth About Windows XP License Key: FCKGW-RHQQ2-YXRKT-8TG6W-2B7Q8
  2. Computer science graduates with no future! Thousands of resumes ignored, and goodbye to six-figure salaries.
  3. With 50 dollars and physical access to the server, the Cloud goes to hell
  4. Shocking collapse: -71% of job offers for software engineers in three years
  5. Hackers hit the United States: critical federal infrastructure compromised
  1. GitHub is migrating to Azure! And goodbye to new development for a year.
  2. WhatsApp Web in the crosshairs! How the worm that distributes the banking Trojan works
  3. “Double Bind” Leads to GPT-5 Jailbreak: The AI That Was Convinced It Was Schizophrenic
  4. Hacker culture pioneer Peter Samson plays “Boards of Canada” on PDP-1
  5. F5 Suffers Security Breach: Source Code and Sensitive Data Stolen

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE