Red Hot Cyber. The Cybersecurity Blog
Discover the Dark Web: Access, Secrets, and Helpful Links to the Onion Network
The Dark Web is a part of the internet that cannot be reached with standard browsers (Chrome, Firefox, Edge). To access it, you need to use specific tools like the Tor Browser, which guarantees anonym...
AI A2 detected 102 0-day bugs and created exploits in Android apps for $1.77
Artificial intelligence systems have been criticized for creating confusing vulnerability reports and inundating open-source developers with irrelevant complaints. But researchers at Nanjing Universit...
$16 billion in stolen Apple, Meta, and Google credentials up for sale for $121,000
The Darklab team, Red Hot Cyber‘s community of threat intelligence experts, has identified an ad on the dark web marketplace “Tor Amazon”, the criminal counterpart of the popular e-commerce site on th...
Red Hot Cyber Conference 2026: Sponsorships Open for the Fifth Edition in Rome
The Red Hot Cyber Conference has become a regular event for the Red Hot Cyber community and for anyone working in or interested in the world of digital technologies and cybersecurity. The fifth editio...
Hexstrike AI unleashes chaos! Zero-days exploited in record time
The release of Hexstrike-AI marks a turning point in the cybersecurity landscape. The framework, billed as a next-generation tool for red teams and researchers, is capable of orchestrating over 150 sp...
LockBit 5.0: Signs of a New and Possible “Rebirth”?
LockBit represents one of the longest-running and most structured ransomware gangs of recent years, with a Ransomware-as-a-Service (RaaS) model that has profoundly impacted the criminal ecosystem. Fol...
The KING of DDoS! Cloudflare blocks a monstrous 11.5 terabit-per-second attack.
The record for the largest DDoS attack ever recorded in June 2025 has already been broken. Cloudflare said it recently blocked the largest DDoS attack in history, which peaked at 11.5 Tbps. “Cloudflar...
Palo Alto Networks Also Compromised via Salesforce and Drift
In early September 2025, Palo Alto Networks confirmed it had been the victim of a data breach. The compromise did not affect its core products or services, but rather some internally used Salesforce i...
Was there terror on Ursula von der Leyen’s flight? Let’s clear things up!
On August 31, 2025, flight AAB53G, operated by a Dassault Falcon 900LX registered OO-GPE and carrying European Commission President Ursula von der Leyen, took off from Warsaw and landed safely at Plov...
Zscaler Data Breach: Lessons Learned About the Evolution of SaaS Threats
Zscaler’s recent confirmation of a data breach resulting from a supply chain attack provides a case study in the evolution of threats against complex SaaS ecosystems. The attack, attributed to the APT...
Featured Articles

The Dark Web is a part of the internet that cannot be reached with standard browsers (Chrome, Firefox, Edge). To access it, you need to use specific tools like the Tor Browser, which guarantees anonym...

Artificial intelligence systems have been criticized for creating confusing vulnerability reports and inundating open-source developers with irrelevant complaints. But researchers at Nanjing Universit...

The Darklab team, Red Hot Cyber‘s community of threat intelligence experts, has identified an ad on the dark web marketplace “Tor Amazon”, the criminal counterpart of the popular e-commerce site...

The Red Hot Cyber Conference has become a regular event for the Red Hot Cyber community and for anyone working in or interested in the world of digital technologies and cybersecurity. The fifth editio...

The release of Hexstrike-AI marks a turning point in the cybersecurity landscape. The framework, billed as a next-generation tool for red teams and researchers, is capable of orchestrating over 150 sp...
China unveils KylinOS11 with AI integration: the national operating system that will replace Windows
The Dawn supercomputer takes the fight against cancer: a new era of research with AI
China launches compact space debris removal system
What is Wetware: The Future of Brain Enhancement Through Hardware and Software
AI browser extensions? There’s too much uncertainty: the risk still lies in user awareness!
Little engineers for big robots! Is Italy also focusing on young people?

China unveils KylinOS11 with AI integration: the national operating system that will replace Windows
Redazione RHC - August 29th, 2025
China has unveiled KylinOS11, the largest update to its national operating system, which the government called a major step forward in creating an independent technology ecosystem. The new version runs...

The Dawn supercomputer takes the fight against cancer: a new era of research with AI
Redazione RHC - August 29th, 2025
The project "A basic model for cancer vaccine design" has been shortlisted for an award from the UK government's prestigious AI Research Resource (AIRR) initiative, led by the Department for...

China launches compact space debris removal system
Redazione RHC - August 29th, 2025
Chinese scientists have unveiled a compact space launcher, initially designed to remove dangerous space debris, but which could potentially be used as a weapon. The project was conceived by engineers...

What is Wetware: The Future of Brain Enhancement Through Hardware and Software
Massimiliano Brolli - August 29th, 2025
By definition, wetware refers to technology that combines hardware and software to enhance biological life forms. Steve M. Potter, an associate professor at the Neuroengineering Laboratory at the University of...

AI browser extensions? There’s too much uncertainty: the risk still lies in user awareness!
Redazione RHC - August 29th, 2025
Anthropic has raised the alarm about a new threat related to "smart" browser extensions: Websites can infiltrate hidden commands that an AI agent will execute without thinking. Anthropic has released...

Little engineers for big robots! Is Italy also focusing on young people?
Redazione RHC - August 29th, 2025
In Stavropol, Russian Federation, the race for the regional robotics championship for younger students has officially begun. Applications can be submitted starting August 25th, with a window that will remain...
Sign up for the newsletter