Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Fortinet 320x100px
Enterprise BusinessLog 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Bus becomes travelling museum of retro computers in UK
Di Redazione RHC - 16/10/2025

In the UK, father and son Jason and Luke Stoner have transformed an old school bus into a traveling museum dedicated to retro computers and game consoles. The inspiration came when Luke visited the fa...

Immagine del sito
100 years of Italian Intelligence! Mattarella celebrates the SIM’s centenary at the Quirinale Palace
Di Redazione RHC - 16/10/2025

October 15, 2025 marks an anniversary of exceptional importance in the history of Italian national security: one hundred years since the birth of the Military Information Service (SIM) , the country&#...

Immagine del sito
But what kind of Sovereign AI is running on the servers and algorithms of a US company!
Di Redazione RHC - 16/10/2025

This year, OpenAI announced a series of projects with foreign governments to create “sovereign AI” systems. According to the company, some of these agreements are currently being negotiate...

Immagine del sito
Flirt, eroticism, and the end of censorship! OpenAI will change the rules of ChatGPT.
Di Redazione RHC - 15/10/2025

OpenAI is preparing a major change to ChatGPT’s rules: starting in December, age-verified users will be able to interact with adult content, including erotica. The company’s CEO, Sam Altma...

Immagine del sito
“Double Bind” Leads to GPT-5 Jailbreak: The AI That Was Convinced It Was Schizophrenic
Di Luca Vinciguerra - 15/10/2025

A new and unusual jailbreaking method, the art of circumventing the limitations imposed on artificial intelligence, has reached our editorial office. It was developed by computer security researcher A...

New Ransomware Group “Vanir Group”: Three Victims Immediately in Their Data Leak Site

A new ransomware group, calling themselves "Vanir Group," has recently made its debut in the cybercrime landscape. This group has quickly garnered att...
Pietro Melillo - 10/07/2024 - 15:47

Meow ransomware claims attack in its Data Leak Site at HPE giant

Introduction Today, the ransomware gang known as Meow has claimed responsibility for a cyberattack on the multinational giant Hewlett Packard Enter...
Pietro Melillo - 10/07/2024 - 15:11

The Threat Actor 888 claimed a compromise against Microsoft

On July 9, 2024, a user known as "888" posted on BreachForums claiming to have leaked sensitive data of Microsoft employees. This alleged breach has e...
Pietro Melillo - 10/07/2024 - 11:40

The Threat Actor 888 claims responsibility for a breach at Nokia.

A malicious actor, known by the alias "888," recently claimed responsibility for disclosing sensitive data belonging to Nokia. The attack, which occur...
Pietro Melillo - 10/07/2024 - 11:11

Citrix Netscaler ADC and Gateway plagued by serious DOS and Open Redirect flaw

Two vulnerabilities have been identified in NetScaler ADC and NetScaler Gateway. Affected Versions: The following supported versions of NetScaler ADC ...
Redazione RHC - 09/07/2024 - 14:21

Massive Data Exposure on X (Twitter) Affects 200 Million Users

Recently, X (Twitter) experienced a massive data exposure, compromising nearly 200 million user records. This incident could be one of the largest use...
Pietro Melillo - 08/07/2024 - 13:51

New Ransomware Group “Vanir Group”: Three Victims Immediately in Their Data Leak Site

- July 10th, 2024

A new ransomware group, calling themselves "Vanir Group," has recently made its debut in the cybercrime landscape. This group has quickly garnered attention for the aggressiveness and professionalism of their...

Facebook Linkedin X

Meow ransomware claims attack in its Data Leak Site at HPE giant

- July 10th, 2024

Introduction Today, the ransomware gang known as Meow has claimed responsibility for a cyberattack on the multinational giant Hewlett Packard Enterprise (HPE). The claim was published on their Data Leak...

Facebook Linkedin X

The Threat Actor 888 claimed a compromise against Microsoft

- July 10th, 2024

On July 9, 2024, a user known as "888" posted on BreachForums claiming to have leaked sensitive data of Microsoft employees. This alleged breach has exposed personal information of 2,073...

Facebook Linkedin X

The Threat Actor 888 claims responsibility for a breach at Nokia.

- July 10th, 2024

A malicious actor, known by the alias "888," recently claimed responsibility for disclosing sensitive data belonging to Nokia. The attack, which occurred in July 2024, compromised a wide range of...

Facebook Linkedin X

Citrix Netscaler ADC and Gateway plagued by serious DOS and Open Redirect flaw

- July 9th, 2024

Two vulnerabilities have been identified in NetScaler ADC and NetScaler Gateway. Affected Versions: The following supported versions of NetScaler ADC and NetScaler Gateway are vulnerable: These devices are widely used...

Facebook Linkedin X

Massive Data Exposure on X (Twitter) Affects 200 Million Users

- July 8th, 2024

Recently, X (Twitter) experienced a massive data exposure, compromising nearly 200 million user records. This incident could be one of the largest user data exposures in recent history, jeopardizing the...

Facebook Linkedin X
Most Read Articles of the Month Most Read Articles of the Week
  1. The Truth About Windows XP License Key: FCKGW-RHQQ2-YXRKT-8TG6W-2B7Q8
  2. Computer science graduates with no future! Thousands of resumes ignored, and goodbye to six-figure salaries.
  3. With 50 dollars and physical access to the server, the Cloud goes to hell
  4. Shocking collapse: -71% of job offers for software engineers in three years
  5. Hackers hit the United States: critical federal infrastructure compromised
  1. The Truth About Windows XP License Key: FCKGW-RHQQ2-YXRKT-8TG6W-2B7Q8
  2. GitHub is migrating to Azure! And goodbye to new development for a year.
  3. WhatsApp Web in the crosshairs! How the worm that distributes the banking Trojan works
  4. “Double Bind” Leads to GPT-5 Jailbreak: The AI That Was Convinced It Was Schizophrenic
  5. Hacker culture pioneer Peter Samson plays “Boards of Canada” on PDP-1

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE