Red Hot Cyber. The Cybersecurity Blog
Cyber Attack on European Airports: Everest Ransomware Claims Claim
On September 20, we reported on a cyberattack that paralyzed several European airports, including Brussels, Berlin, and London Heathrow. This was a supply chain attack that exploited the compromise of...
Inmates hack prison: sentences reduced, funds transferred, and unauthorized visits
The Romanian penitentiary system has found itself at the center of a major digital scandal: inmates in Târgu Jiu hacked the PNA’s internal platform and, for several months, managed data on priso...
WiFi: From Marconi’s Origins to the Wireless Network We Know Today
Today, we live in a world where WiFi is a fundamental necessity, but how did this technology, now taken for granted, come about? How did it then develop into the network we now use every day? In this ...
Operation SIMCARTEL: 1,200 SIM boxes and 40,000 SIM cards stopped by Europol
On October 10, 2025, Latvian authorities conducted a day of action that resulted in the arrest of five Latvian citizens suspected of running a large-scale cyber fraud network. The operation, dubbed SI...
Nvidia loses 95% of the Chinese AI market! Export restrictions cause its share to plummet
Jen-Hsun Huang, founder and CEO of Nvidia, revealed that recent export restrictions have drastically reduced the presence of the company’s AI chips in China , from 95% to virtually nothing. “Four year...
Cyberdrones, radar evasion, and autonomous swarms: Rome, the invisible challenge of Jubilee 2025
Jubilee 2025 in Rome presents a challenge not only for managing millions of pilgrims and tourists, but also for protecting urban airspace. Drones, increasingly widespread and accessible, bring with th...
Bus becomes travelling museum of retro computers in UK
In the UK, father and son Jason and Luke Stoner have transformed an old school bus into a traveling museum dedicated to retro computers and game consoles. The inspiration came when Luke visited the fa...
100 years of Italian Intelligence! Mattarella celebrates the SIM’s centenary at the Quirinale Palace
October 15, 2025 marks an anniversary of exceptional importance in the history of Italian national security: one hundred years since the birth of the Military Information Service (SIM) , the country&#...
But what kind of Sovereign AI is running on the servers and algorithms of a US company!
This year, OpenAI announced a series of projects with foreign governments to create “sovereign AI” systems. According to the company, some of these agreements are currently being negotiate...
Flirt, eroticism, and the end of censorship! OpenAI will change the rules of ChatGPT.
OpenAI is preparing a major change to ChatGPT’s rules: starting in December, age-verified users will be able to interact with adult content, including erotica. The company’s CEO, Sam Altma...
Featured Articles

On September 20, we reported on a cyberattack that paralyzed several European airports, including Brussels, Berlin, and London Heathrow. This was a supply chain attack that exploited the compromise of...

The Romanian penitentiary system has found itself at the center of a major digital scandal: inmates in Târgu Jiu hacked the PNA’s internal platform and, for several months, managed data on pris...

Today, we live in a world where WiFi is a fundamental necessity, but how did this technology, now taken for granted, come about? How did it then develop into the network we now use every day? In this ...

On October 10, 2025, Latvian authorities conducted a day of action that resulted in the arrest of five Latvian citizens suspected of running a large-scale cyber fraud network. The operation, dubbed SI...

Jen-Hsun Huang, founder and CEO of Nvidia, revealed that recent export restrictions have drastically reduced the presence of the company’s AI chips in China , from 95% to virtually nothing. “Four ...
Alleged Cyber Attack on Dana Pensiun Bank Mandiri
Microsoft presents Majorana 1: The Quantum Processor Promising to Reshape the Future
Linkc Ransomware: The New Cybercriminal Group Targeting Artificial Intelligence Data
The UK’s Digital Crackdown: how the government is using our online habits to breach human rights
Ransomware Gangs weaponize Windows Defender Application Control (WDAC) to disable EDR products.
The Story Of Conti Ransomware – The Last Ceremony (Final Episode)

Alleged Cyber Attack on Dana Pensiun Bank Mandiri
Redazione RHC - March 1st, 2025
Alleged Cyber Attack on Dapenbankmandiri.co.id A well-known threat actor, using the alias "LordVoldemort," has claimed on an underground forum to be in possession of an alleged data set belonging to...

Microsoft presents Majorana 1: The Quantum Processor Promising to Reshape the Future
Tara Lie - February 24th, 2025
Microsoft has taken a significant step forward in the field of quantum computing with the launch of its first quantum processor: Majorana 1. Unlike most quantum chips that are based...

Linkc Ransomware: The New Cybercriminal Group Targeting Artificial Intelligence Data
Pietro Melillo - February 20th, 2025
In the DarkLab group's underground analysis activity, we ventured onto an onion site that is apparently a Data Leak Site (DLS) of a new ransomware cyber gang. This new actor...

The UK’s Digital Crackdown: how the government is using our online habits to breach human rights
Ashleigh Crause - February 12th, 2025
In today's digital age, the boundaries between lawful expression and governmental overreach are becoming increasingly blurred in the United Kingdom. Citizens are finding themselves under scrutiny, and in some cases,...

Ransomware Gangs weaponize Windows Defender Application Control (WDAC) to disable EDR products.
Alex Necula - January 13th, 2025
In the past days we saw that Ransomware Gangs use WDAC to disable EDR products. I have known this type of attack for a year when a guy posts a...

The Story Of Conti Ransomware – The Last Ceremony (Final Episode)
Alessio Stefan - January 8th, 2025
This is the last episode of “The Story Of Conti Ransomware” series, we would finally reach the decline of the group and what this means for the current ransomware landscape....
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE