Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Banner Ancharia Mobile 1
HackTheBox 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

ShadowV2: New MaaS botnet for DDoS attacks uses containers Cybercrime

ShadowV2: New MaaS botnet for DDoS attacks uses containers

Amid growing criminal activity, Darktrace has uncovered a new campaign using the ShadowV2 botnet. Researchers detected malicious activity on June...
Redazione RHC - 24 September 2025
GitHub strengthens npm security against supply chain attacks. Cybercrime

GitHub strengthens npm security against supply chain attacks.

GitHub has announced major changes to its npm authentication and publishing system, aimed at strengthening protection against supply chain attacks....
Redazione RHC - 24 September 2025
Towards AGI: Google DeepMind warns, AI could ignore humans Cybercrime

Towards AGI: Google DeepMind warns, AI could ignore humans

Google DeepMind researchers have released an updated version of their AI risk assessment framework, Frontier Safety Framework 3.0 . This...
Redazione RHC - 24 September 2025
From Debugging to Breaking: Turning Crash Dumps into EDR Kill Switches Cybercrime

From Debugging to Breaking: Turning Crash Dumps into EDR Kill Switches

I have been working for several years as a System Engineer, and one of the tasks I handled was managing...
Alex Necula - 24 September 2025
RAN Hacking: US Intelligence Uncovers Clandestine Cellular Network in New York Cybercrime

RAN Hacking: US Intelligence Uncovers Clandestine Cellular Network in New York

U.S. intelligence agencies have reported discovering and seizing a network of telecommunications equipment in the New York area capable of...
Redazione RHC - 23 September 2025
Chrome for Android: From a “wall of text” to a podcast is a short step. Cybercrime

Chrome for Android: From a “wall of text” to a podcast is a short step.

Google has added a new AI-powered feature to Chrome for Android for reading web pages. Instead of reading the entire...
Redazione RHC - 23 September 2025

Commodore 64: The return of the best-selling retro computer of all time is now

The record for best-selling desktop computer of all time is still held by the Commodore 64, as certified by the Guinness Book of Records, despite its discontinuation in 1994. However,...
Share on Facebook Share on LinkedIn Share on X

The History of the Linux Kernel (2 of 2). Early Hackers Up to Version 1.0.

Article by Pietro Cornelio and Massimiliano Brolli Previous articles: The history of the Linux Kernel (1 of 2). From Torvalds to the hacker community In the first article we met...
Share on Facebook Share on LinkedIn Share on X

The History of the Linux Kernel (1 of 2). From Torvalds to the Hacker Community

Article by Pietro Cornelio and Massimiliano Brolli The history of the Linux Kernel is a story of pure hacking as well as being a miracle of "collaboration". It is the...
Share on Facebook Share on LinkedIn Share on X

Cult of the Dead Cow (cDc). The story of the most famous hacker group.

Hacker culture, as we've already discussed, is a fascinating subject that has evolved significantly over time to reach the present day. We talked about its origins in a video dedicated...
Share on Facebook Share on LinkedIn Share on X

Apple 2: the story of a great success.

On June 10, 1977, the Apple II went on sale, the historic microcomputer that kicked off the home computing revolution. We'd like to dedicate an article to its history. The...
Share on Facebook Share on LinkedIn Share on X

Russian domestic hackers Cozy Bear (APT29). Analysis of the main attacks and their TTPs.

Author: Gianluca Tiepolo APT29 is a highly sophisticated Advanced Persistent Threat (APT) group that has been attributed to Russia's Foreign Intelligence Service (SVR). The group has been active since at...
Share on Facebook Share on LinkedIn Share on X

Critical Vulnerability in FortiWeb: Score 9.6 and Unauthorized SQL Commands

A new vulnerability, tracked under CVE-2025-25257, was recently published affecting several versions of Fortinet FortiWeb. This vulnerability could allow unauthenticated attackers to execute unauthorized SQL commands via forged HTTP/S requests....
Share on Facebook Share on LinkedIn Share on X

A RCE vulnerability in Wing FTP Server rated 10 opens the door to 10,000 companies.

Huntress researchers have detected active exploitation of a critical vulnerability in Wing FTP Server, just one day after its public disclosure. The vulnerability CVE-2025-47812 has been assigned the highest severity...
Share on Facebook Share on LinkedIn Share on X

There’s no such thing as zero risk! There’s only one risk you need to know to manage.

Cybersecurity is a critically important topic for companies and organizations of all sizes and industries. As business operations and information management become increasingly digital, the risk of cyberattacks has become...
Share on Facebook Share on LinkedIn Share on X

Working in cybersecurity. Cybersecurity needs you.

We know it by now. Every country in the world (including Italy) has a huge shortage of cybersecurity experts, while cybercrime is rampant in every corner of the globe. This...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
PurpleBravo’s Contagious Interview: Malware Campaign Targets Global Firms
Redazione RHC - 22/01/2026

For over a year, the North Korean group PurpleBravo has been running a targeted malware campaign called “Contagious Interview,” using fake job interviews to attack companies in Europe, Asia, the Middle East, and Central America.…

Immagine del sitoCybercrime
KONNI Malware Targets Crypto Developers with AI-Powered Attacks
Redazione RHC - 22/01/2026

Check Point Research recently discovered a sophisticated phishing campaign orchestrated by KONNI , a threat group linked to North Korea . Historically focused on diplomatic targets in South Korea, the malicious actor has now expanded…

Immagine del sitoCybercrime
Fortinet FortiOS Vulnerability Exploited: CVE-2025-59718 Patch Bypass
Redazione RHC - 22/01/2026

Attackers are exploiting a previously patched critical FortiGate authentication flaw (CVE-2025-59718) through a patch bypass method to breach protected firewalls, as Fortinet customers are experiencing. Fortinet reportedly plans to soon release FortiOS versions 7.4.11, 7.6.6,…

Immagine del sitoCybercrime
Cisco Zero-Day Vulnerability CVE-2026-20045 Actively Exploited
Redazione RHC - 22/01/2026

A critical zero-day remote code execution (RCE) vulnerability, identified as CVE-2026-20045, has been discovered by Cisco and is being actively exploited in active attacks. Cisco has urged immediate patching, and its Product Security Incident Response…

Immagine del sitoinnovation
Red Hot Cyber and Hack The Box: together for the CTF at the RHC 2026 conference
Redazione RHC - 21/01/2026

In the Italian and European cybersecurity landscape, few collaborations manage to combine educational vision, technical realism, and community impact as effectively as the partnership announced between Red Hot Cyber and Hack The Box (HTB) for…