Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Banner Mobile V1
Banner Ancharia Desktop 1 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
WiFi: From Marconi’s Origins to the Wireless Network We Know Today
Di RedWave Team - 18/10/2025

Today, we live in a world where WiFi is a fundamental necessity, but how did this technology, now taken for granted, come about? How did it then develop into the network we now use every day? In this ...

Immagine del sito
Operation SIMCARTEL: 1,200 SIM boxes and 40,000 SIM cards stopped by Europol
Di Redazione RHC - 18/10/2025

On October 10, 2025, Latvian authorities conducted a day of action that resulted in the arrest of five Latvian citizens suspected of running a large-scale cyber fraud network. The operation, dubbed SI...

Immagine del sito
Nvidia loses 95% of the Chinese AI market! Export restrictions cause its share to plummet
Di Redazione RHC - 17/10/2025

Jen-Hsun Huang, founder and CEO of Nvidia, revealed that recent export restrictions have drastically reduced the presence of the company’s AI chips in China , from 95% to virtually nothing. “Four ...

Immagine del sito
Cyberdrones, radar evasion, and autonomous swarms: Rome, the invisible challenge of Jubilee 2025
Di Francesco Demarcus - 17/10/2025

Jubilee 2025 in Rome presents a challenge not only for managing millions of pilgrims and tourists, but also for protecting urban airspace. Drones, increasingly widespread and accessible, bring with th...

Immagine del sito
Bus becomes travelling museum of retro computers in UK
Di Redazione RHC - 16/10/2025

In the UK, father and son Jason and Luke Stoner have transformed an old school bus into a traveling museum dedicated to retro computers and game consoles. The inspiration came when Luke visited the fa...

Stormous claims an attack on NASA

In recent years, the landscape of cyber threats has been dominated by increasingly sophisticated ransomware groups. Among them, the ransomware group S...
Pietro Melillo - 09/10/2024 - 19:50

The Story Of Conti Ransomware – Origins and Evolution of the RaaS Model (Episode 1)

Ransomware, a malware designed to encrypt data making them restorable only with the use of a private key. Relatively simple math is all that threat ac...
Alessio Stefan - 30/09/2024 - 07:16

RHC Interviews Lynx Ransomware. The cyber-gang offering Pentest services ensuring privacy

In July 2024, the Lynx group burst into the RaaS world, which from the outset demonstrated above-average aggressiveness and success in attacks with a ...
RHC Dark Lab - 23/09/2024 - 07:06

Alleged SpaceX Database Breach Published on BreachForums

A recent post on a dark web forum has caught the attention of the international cybersecurity community. A user, identified by the nickname l33tfg, cl...
Pietro Melillo - 21/09/2024 - 16:01

WhiteHouse.gov Data Breach: Threat Actors Leak Sensitive Information!

Recently, a threat actor on a dark web forum has posted a claim regarding an alleged data breach involving WhiteHouse.gov. The post, made by a user na...
Redazione RHC - 21/09/2024 - 09:30

RHC interviews Qilin Ransomware! “Let’s play fair and wait for a worthy opponent on the field”

Qilin (from Chinese :麒麟) is a legendary creature that appears in Chinese mythology and is said to appear with the imminent arrival or demise of a sage...
RHC Dark Lab - 19/09/2024 - 07:12

Stormous claims an attack on NASA

- October 9th, 2024

In recent years, the landscape of cyber threats has been dominated by increasingly sophisticated ransomware groups. Among them, the ransomware group Stormous has gained notoriety for targeting high-profile organizations, including...

Facebook Linkedin X

The Story Of Conti Ransomware – Origins and Evolution of the RaaS Model (Episode 1)

- September 30th, 2024

Ransomware, a malware designed to encrypt data making them restorable only with the use of a private key. Relatively simple math is all that threat actors out there needs to...

Facebook Linkedin X

RHC Interviews Lynx Ransomware. The cyber-gang offering Pentest services ensuring privacy

- September 23rd, 2024

In July 2024, the Lynx group burst into the RaaS world, which from the outset demonstrated above-average aggressiveness and success in attacks with a total of 22 victims featured on...

Facebook Linkedin X

Alleged SpaceX Database Breach Published on BreachForums

- September 21st, 2024

A recent post on a dark web forum has caught the attention of the international cybersecurity community. A user, identified by the nickname l33tfg, claimed to have published a supposed...

Facebook Linkedin X

WhiteHouse.gov Data Breach: Threat Actors Leak Sensitive Information!

- September 21st, 2024

Recently, a threat actor on a dark web forum has posted a claim regarding an alleged data breach involving WhiteHouse.gov. The post, made by a user named "l33tfg," asserts that...

Facebook Linkedin X

RHC interviews Qilin Ransomware! “Let’s play fair and wait for a worthy opponent on the field”

- September 19th, 2024

Qilin (from Chinese :麒麟) is a legendary creature that appears in Chinese mythology and is said to appear with the imminent arrival or demise of a sage or illustrious ruler....

Facebook Linkedin X
Most Read Articles of the Month Most Read Articles of the Week
  1. The Truth About Windows XP License Key: FCKGW-RHQQ2-YXRKT-8TG6W-2B7Q8
  2. Computer science graduates with no future! Thousands of resumes ignored, and goodbye to six-figure salaries.
  3. With 50 dollars and physical access to the server, the Cloud goes to hell
  4. Shocking collapse: -71% of job offers for software engineers in three years
  5. Hackers hit the United States: critical federal infrastructure compromised
  1. GitHub is migrating to Azure! And goodbye to new development for a year.
  2. WhatsApp Web in the crosshairs! How the worm that distributes the banking Trojan works
  3. “Double Bind” Leads to GPT-5 Jailbreak: The AI That Was Convinced It Was Schizophrenic
  4. Hacker culture pioneer Peter Samson plays “Boards of Canada” on PDP-1
  5. F5 Suffers Security Breach: Source Code and Sensitive Data Stolen

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE