Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
UtiliaCS 320x100
Banner Ransomfeed 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Intel releases urgent patches for new Spectre variant
Di Redazione RHC - 19/10/2025

VUSec researchers have presented a paper titled “Training Solo,” which challenges the fundamental principles of protection against Spectre-v2 attacks. Previously , the domain isolation mec...

Immagine del sito
Famous hackers: Vladimir Levin and the first online bank robbery.
Di Redazione RHC - 18/10/2025

Today we’ll meet another hacker from the past. He’s Vladimir Levin, a Russian hacker from St. Petersburg (Владимир Леонидович Левин), who became famous for breaking ...

Immagine del sito
Cyber Attack on European Airports: Everest Ransomware Claims Claim
Di Redazione RHC - 18/10/2025

On September 20, we reported on a cyberattack that paralyzed several European airports, including Brussels, Berlin, and London Heathrow. This was a supply chain attack that exploited the compromise of...

Immagine del sito
Inmates hack prison: sentences reduced, funds transferred, and unauthorized visits
Di Redazione RHC - 18/10/2025

The Romanian penitentiary system has found itself at the center of a major digital scandal: inmates in Târgu Jiu hacked the PNA’s internal platform and, for several months, managed data on pris...

Immagine del sito
WiFi: From Marconi’s Origins to the Wireless Network We Know Today
Di RedWave Team - 18/10/2025

Today, we live in a world where WiFi is a fundamental necessity, but how did this technology, now taken for granted, come about? How did it then develop into the network we now use every day? In this ...

Cyber War: The Invisible War in Cyberspace That Decides the Conflicts of the Present

In the heart of contemporary conflicts, alongside tanks, drones and troops, an invisible, silent and often underestimated war is being fought: cyber w...
Paolo Galdieri - 27/06/2025 - 22:14

Skynet is coming: the malware that attacks Artificial Intelligence!

An unusual example of malicious code has been discovered in a real computing environment, which for the first time recorded an attempt to attack not c...
Redazione RHC - 27/06/2025 - 19:10

Cybersecurity, from NIS2 to the Cyber Resilience Act: Fortinet guides companies in compliance with the new regulatory landscape

By Aldo Di Mattia, Director of Specialized Systems Engineering and Cybersecurity Advisor Italy and Malta at Fortinet After years of defining new re...
Redazione RHC - 27/06/2025 - 19:10

Critical Vulnerabilities Discovered in Hundreds of Brother and Other Printers

Hundreds of printer models from Brother and other manufacturers (Fujifilm, Toshiba, Ricoh and Konica Minolta) have been found to be vulnerable to seri...
Redazione RHC - 27/06/2025 - 15:34

Pope warns: “AI is not the devil, but it can become one without ethics”

The head of the Catholic Churchhas expressed concern about the way today's children and adolescents interact with digital technologies. In his viewthe...
Redazione RHC - 27/06/2025 - 09:20

Microsoft 365 Under Attack: How Hackers Use Direct Send to Send Phishing Emails

A sophisticated phishing campaign that targeted over 70 organizations by exploiting Microsoft 365's Direct Send feature. The campaign, which began in ...
Redazione RHC - 27/06/2025 - 08:08

Cyber War: The Invisible War in Cyberspace That Decides the Conflicts of the Present

- June 27th, 2025

In the heart of contemporary conflicts, alongside tanks, drones and troops, an invisible, silent and often underestimated war is being fought: cyber war. It is not just a futuristic scenario...

Facebook Linkedin X

Skynet is coming: the malware that attacks Artificial Intelligence!

- June 27th, 2025

An unusual example of malicious code has been discovered in a real computing environment, which for the first time recorded an attempt to attack not classical defense mechanisms, but directly...

Facebook Linkedin X

Cybersecurity, from NIS2 to the Cyber Resilience Act: Fortinet guides companies in compliance with the new regulatory landscape

- June 27th, 2025

By Aldo Di Mattia, Director of Specialized Systems Engineering and Cybersecurity Advisor Italy and Malta at Fortinet After years of defining new regulatory strategies, the regulatory landscape, particularly in Europe,...

Facebook Linkedin X

Critical Vulnerabilities Discovered in Hundreds of Brother and Other Printers

- June 27th, 2025

Hundreds of printer models from Brother and other manufacturers (Fujifilm, Toshiba, Ricoh and Konica Minolta) have been found to be vulnerable to serious vulnerabilities discovered by researchers at Rapid7. For...

Facebook Linkedin X

Pope warns: “AI is not the devil, but it can become one without ethics”

- June 27th, 2025

The head of the Catholic Churchhas expressed concern about the way today's children and adolescents interact with digital technologies. In his viewthe abundance of information available through neural networks and...

Facebook Linkedin X

Microsoft 365 Under Attack: How Hackers Use Direct Send to Send Phishing Emails

- June 27th, 2025

A sophisticated phishing campaign that targeted over 70 organizations by exploiting Microsoft 365's Direct Send feature. The campaign, which began in May 2025 and has shown steady activity over the...

Facebook Linkedin X
Most Read Articles of the Month Most Read Articles of the Week
  1. The Truth About Windows XP License Key: FCKGW-RHQQ2-YXRKT-8TG6W-2B7Q8
  2. Computer science graduates with no future! Thousands of resumes ignored, and goodbye to six-figure salaries.
  3. With 50 dollars and physical access to the server, the Cloud goes to hell
  4. Shocking collapse: -71% of job offers for software engineers in three years
  5. Hackers hit the United States: critical federal infrastructure compromised
  1. GitHub is migrating to Azure! And goodbye to new development for a year.
  2. WhatsApp Web in the crosshairs! How the worm that distributes the banking Trojan works
  3. “Double Bind” Leads to GPT-5 Jailbreak: The AI That Was Convinced It Was Schizophrenic
  4. Hacker culture pioneer Peter Samson plays “Boards of Canada” on PDP-1
  5. F5 Suffers Security Breach: Source Code and Sensitive Data Stolen

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE