Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
320x100 Itcentric
970x20 Itcentric

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

First malware with integrated GPT-4 discovered: MalTerminal arrives Cybercrime

First malware with integrated GPT-4 discovered: MalTerminal arrives

SentinelLABS researchers have discovered what they describe as the first known example of malware with integrated LLM functionality , dubbed...
Redazione RHC - 22 September 2025
The winners of the AI race? Electricians and plumbers. Cybercrime

The winners of the AI race? Electricians and plumbers.

In an interview with Channel 4 News, Nvidia CEO Jensen Huang said that in the race to succeed in the...
Redazione RHC - 22 September 2025
SonicWall warns customers to change credentials after security breach Cybercrime

SonicWall warns customers to change credentials after security breach

SonicWall has warned its customers to change their login credentials as soon as possible. A cyberattack on MySonicWall accounts compromised...
Redazione RHC - 22 September 2025
“He doesn’t understand me, but ChatGPT does”: The 21st-century love triangle Cybercrime

“He doesn’t understand me, but ChatGPT does”: The 21st-century love triangle

The American magazine Futurism has described a new conflict at the intersection of technology and personal life: artificial intelligence bots...
Redazione RHC - 22 September 2025
Major DarkForums Leak: 196 Italian Sites Exposed with Clear FTP Credentials Cybercrime

Major DarkForums Leak: 196 Italian Sites Exposed with Clear FTP Credentials

On September 20, 2025, at 11:52 PM, a thread titled “FRESH FTP LEAK” appeared on DarkForums , posted by user...
Luca Stivali - 22 September 2025
From Leash to Autonomy: Ban, Nvidia Block, and Huawei’s AI Cluster Solutions Cybercrime

From Leash to Autonomy: Ban, Nvidia Block, and Huawei’s AI Cluster Solutions

China's Huawei has taken a major step in developing its own artificial intelligence infrastructure. The company has unveiled solutions designed...
Redazione RHC - 22 September 2025

Discovering Drumrlu. The IaB that does big business between Türkiye and Venezuela

After the Far East and Iran, we continue our series of articles on IAB actors with an actor believed to be based in Europe, in a NATO country. Origin and...
Share on Facebook Share on LinkedIn Share on X

Human Replatforming! Artificial Intelligence Threatens Half of Jobs

The chairman of the American car company Ford, Jim Farley, has released a statement sharp on the future of the job market in the age of artificial intelligence. According to...
Share on Facebook Share on LinkedIn Share on X

123 Stealer is coming! $120 a month subscription to steal any confidential data

A new infostealer emerges from the criminal underground and its name is "123 | Stealer". The author of this software is a hacker who hides under the pseudonym koneko. He...
Share on Facebook Share on LinkedIn Share on X

Pig Butchering Scam: How Pig Slaughter Is Becoming an Emotional Addiction Scam

In the interconnected labyrinth of the 21st century, where the desire for authenticity and the search for opportunity dance on the edge of paradox, a dark phenomenon emerges that challenges...
Share on Facebook Share on LinkedIn Share on X

He’s 13 and Hacked Microsoft Teams! The Story of Dylan, One of the Youngest Bug Hunters

At just 13 years old, Dylan became the youngest security researcher to collaborate with the Microsoft Security Response Center (MSRC), demonstrating how curiosity and perseverance can have a real impact,...
Share on Facebook Share on LinkedIn Share on X

He’s 13 and Hacked Microsoft Teams! The Story of Dylan, One of the Youngest Bug Hunters

At just 13 years old, Dylan became the youngest security researcher to collaborate with the Microsoft Security Response Center (MSRC), demonstrating how curiosity and perseverance can have a real impact,...
Share on Facebook Share on LinkedIn Share on X

Discovering the Jargon File! The Living Relic of Hacker Culture

Jargon File version 4.4.7 Today I would like to talk to you about a very old computer document, containing a piece of everyone's hacker and computer culture times, of which...
Share on Facebook Share on LinkedIn Share on X

The History of Email. How This Invention Impacted the Modern Era

Email was in fact the first of those disruptive revolutions that catapulted the world into the era of networks and the Internet. Thinking about offices today, before the email revolution...
Share on Facebook Share on LinkedIn Share on X

The “Declaration of Independence of Cyberspace”

"Governments of the World, weary giants of flesh and steel, I come from Cyberspace, the new home of the Mind. On behalf of the future, I ask you, beings of...
Share on Facebook Share on LinkedIn Share on X

Satoshi Nakamoto: Discover the Mysterious Inventor of Bitcoin.

The true identity of the creator of Bitcoin is one of the biggest mysteries in the tech world. Over the years, many theories have emerged about who Satoshi Nakamoto really...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Fortinet FortiOS Vulnerability Exploited: CVE-2025-59718 Patch Bypass
Redazione RHC - 22/01/2026

Attackers are exploiting a previously patched critical FortiGate authentication flaw (CVE-2025-59718) through a patch bypass method to breach protected firewalls, as Fortinet customers are experiencing. Fortinet reportedly plans to soon release FortiOS versions 7.4.11, 7.6.6,…

Immagine del sitoCybercrime
Cisco Zero-Day Vulnerability CVE-2026-20045 Actively Exploited
Redazione RHC - 22/01/2026

A critical zero-day remote code execution (RCE) vulnerability, identified as CVE-2026-20045, has been discovered by Cisco and is being actively exploited in active attacks. Cisco has urged immediate patching, and its Product Security Incident Response…

Immagine del sitoinnovation
Red Hot Cyber and Hack The Box: together for the CTF at the RHC 2026 conference
Redazione RHC - 21/01/2026

In the Italian and European cybersecurity landscape, few collaborations manage to combine educational vision, technical realism, and community impact as effectively as the partnership announced between Red Hot Cyber and Hack The Box (HTB) for…

Immagine del sitoCybercrime
Everest Ransomware Attacks McDonald’s, 861GB Data Stolen
Redazione RHC - 21/01/2026

Yesterday, the Everest cybercriminal gang claimed responsibility for a cyberattack on McDonald’s on their Data Leak Site (DLS) . From the gang’s post, the cybercriminals claim to have 861GB of data exfiltrated from the company’s…

Immagine del sitoCybercrime
ESXi Zero-Day Exploit: How to Protect Your VMware Environment
Redazione RHC - 20/01/2026

A group of attackers is using a zero-day exploit toolkit to compromise VMware ESXi instances in an uncontrolled manner, taking advantage of multiple vulnerabilities to bypass virtual machine restrictions. The current incident highlights the ongoing…