Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Banner Ancharia Mobile 1
UtiliaCS 970x120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

AI in the Hands of Criminal Hackers: The Game Has Changed, and We’re at a Disadvantage Cybercrime

AI in the Hands of Criminal Hackers: The Game Has Changed, and We’re at a Disadvantage

In recent months, during my research and studies, I have come across a reality as surprising as it is worrying:...
Ivan Garzaro - 23 September 2025
Samsung under attack in Italy: phones held hostage by ransomware Culture

Samsung under attack in Italy: phones held hostage by ransomware

For a few days now, news has been circulating, which I don't think has been confirmed by official sources, of...
Michele Pinassi - 23 September 2025
PureVPN on Linux: Researcher Finds Security and Anonymity Issues Cybercrime

PureVPN on Linux: Researcher Finds Security and Anonymity Issues

An independent researcher named Andreas, who runs the blog Anagogistis , has discovered serious vulnerabilities in Pure VPN's Linux clients...
Redazione RHC - 22 September 2025
Ally Solos AI Glasses for the Visually Impaired: Autonomy and Safety Cybercrime

Ally Solos AI Glasses for the Visually Impaired: Autonomy and Safety

Envision’s Ally Solos AI glasses are a breath of fresh air for people with visual impairments, helping them read ,...
Redazione RHC - 22 September 2025
When Unicode Becomes a Weapon and Your Email Betrays You, Inboxfuscation Arrives Cybercrime

When Unicode Becomes a Weapon and Your Email Betrays You, Inboxfuscation Arrives

Attackers are increasingly using Microsoft Exchange inbox capabilities to ensure persistence and steal sensitive information within corporate networks. Inboxfuscation ,...
Redazione RHC - 22 September 2025
Scattered Spider: The teenage genius who hacked Las Vegas is in custody. Cybercrime

Scattered Spider: The teenage genius who hacked Las Vegas is in custody.

A series of high-profile attacks on the Las Vegas gambling industry in 2023 has now reached its final phase. Several...
Redazione RHC - 22 September 2025

Creeper & Reaper: The story of the first worm and the first antivirus software.

It's not uncommon to find references to information technology innovations in video games. Ada Lovelace (the first programmer in history), gave her name to the robot in Folsom 4, but...
Share on Facebook Share on LinkedIn Share on X

Businesses are going bankrupt due to ransomware. Small and medium-sized businesses, beware!

Very often on RHC, we talk about cyber attacks and ransomware. But this time, we want to go further. We want to talk about the companies that didn't make it,...
Share on Facebook Share on LinkedIn Share on X

What is ransomware? Let’s explore how RaaS works and what it means.

Many people often want to understand the ransomware phenomenon precisely, its meaning, the methods of violation, and the crime that revolves around it, struggling to find information scattered across thousands...
Share on Facebook Share on LinkedIn Share on X

The Shellter Elite suite used by Red Teams to bypass EDRs is now being used by cybercrime

Shellter Project, maker of a commercial downloader for bypassing antivirus and EDR systems, has reported that hackers are using its Shellter Elite product for attacks. This is because one of...
Share on Facebook Share on LinkedIn Share on X

Is the end of state-led cyberspace invasions coming? The 56-page draft prepared by the UN

The eleventh final session of the Open-Ended Working Group (OEWG) on cybersecurity opened at the United Nations Headquarters in New York on July 7. The group was created in 2019...
Share on Facebook Share on LinkedIn Share on X

Claude Shannon: Father of Cryptography and Founder of the Information Age

Whoever has as a mission, to deal with computer security and therefore also with cryptography, must necessarily pass through the figures of two giants of the last century. We are...
Share on Facebook Share on LinkedIn Share on X

Who are the most famous hackers in history?

We often talk about hackers, but who are the famous hackers that ever existed? Considered by many as eccentric geniuses and computer wizards, by others they have the appearance of...
Share on Facebook Share on LinkedIn Share on X

Underwater cables and the “cyber war of the seabed”. Between control, geopolitics and technology

Author: 5ar0m4n Publishing Date: 11/7/2021 We have often addressed the topic of undersea cables on RHC where we talked about the first submarine cable in history and the last one...
Share on Facebook Share on LinkedIn Share on X

Pig Butchering Scam: How Pig Slaughter Is Becoming an Emotional Addiction Scam

In the interconnected labyrinth of the 21st century, where the desire for authenticity and the search for opportunity dance on the edge of paradox, a dark phenomenon emerges that challenges...
Share on Facebook Share on LinkedIn Share on X

A new Poc Exploit allows Privilege Excalation on Linux using the udisksd daemon

A proof-of-concept (PoC) exploit for a critical vulnerability that allows local privilege escalation has been developed, affecting several major Linux distributions, such as Fedora and SUSE. The vulnerability, tracked as...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
KONNI Malware Targets Crypto Developers with AI-Powered Attacks
Redazione RHC - 22/01/2026

Check Point Research recently discovered a sophisticated phishing campaign orchestrated by KONNI , a threat group linked to North Korea . Historically focused on diplomatic targets in South Korea, the malicious actor has now expanded…

Immagine del sitoCybercrime
Fortinet FortiOS Vulnerability Exploited: CVE-2025-59718 Patch Bypass
Redazione RHC - 22/01/2026

Attackers are exploiting a previously patched critical FortiGate authentication flaw (CVE-2025-59718) through a patch bypass method to breach protected firewalls, as Fortinet customers are experiencing. Fortinet reportedly plans to soon release FortiOS versions 7.4.11, 7.6.6,…

Immagine del sitoCybercrime
Cisco Zero-Day Vulnerability CVE-2026-20045 Actively Exploited
Redazione RHC - 22/01/2026

A critical zero-day remote code execution (RCE) vulnerability, identified as CVE-2026-20045, has been discovered by Cisco and is being actively exploited in active attacks. Cisco has urged immediate patching, and its Product Security Incident Response…

Immagine del sitoinnovation
Red Hot Cyber and Hack The Box: together for the CTF at the RHC 2026 conference
Redazione RHC - 21/01/2026

In the Italian and European cybersecurity landscape, few collaborations manage to combine educational vision, technical realism, and community impact as effectively as the partnership announced between Red Hot Cyber and Hack The Box (HTB) for…

Immagine del sitoCybercrime
Everest Ransomware Attacks McDonald’s, 861GB Data Stolen
Redazione RHC - 21/01/2026

Yesterday, the Everest cybercriminal gang claimed responsibility for a cyberattack on McDonald’s on their Data Leak Site (DLS) . From the gang’s post, the cybercriminals claim to have 861GB of data exfiltrated from the company’s…