Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Crowdstrike 320×100
Enterprise BusinessLog 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Palo Alto Networks Also Compromised via Salesforce and Drift Cybercrime

Palo Alto Networks Also Compromised via Salesforce and Drift

In early September 2025, Palo Alto Networks confirmed it had been the victim of a data breach. The compromise did...
Antonio Piazzolla - 2 September 2025
The Battle Between OnlyFans and Google: Piracy, AI, and the Chaos of Automated Copyright Cybercrime

The Battle Between OnlyFans and Google: Piracy, AI, and the Chaos of Automated Copyright

The massive clash between adult content creators and pirates, now transferred to automated copyright protection systems, is beginning to radically...
Redazione RHC - 2 September 2025
Was there terror on Ursula von der Leyen’s flight? Let’s clear things up! Cybercrime

Was there terror on Ursula von der Leyen’s flight? Let’s clear things up!

On August 31, 2025, flight AAB53G, operated by a Dassault Falcon 900LX registered OO-GPE and carrying European Commission President Ursula...
Giovanni Pollola - 2 September 2025
Video Surveillance Under Attack: A Hikvision Bug Allows Admin Access Without a Login Cybercrime

Video Surveillance Under Attack: A Hikvision Bug Allows Admin Access Without a Login

At the end of August 2025, a high-impact vulnerability affecting HikCentral Professional, the Hikvision platform used to centrally manage video...
Antonio Piazzolla - 2 September 2025
Nearly a third of web traffic is generated by bots! The era of invasive AI is now Cybercrime

Nearly a third of web traffic is generated by bots! The era of invasive AI is now

Yesterday, the Red Hot Cyber website was inaccessible for about an hour. But what's going on, we wondered? After a...
Redazione RHC - 2 September 2025
Lazarus APT: 3 Advanced RATs for Cryptocurrency Financial Organizations Cybercrime

Lazarus APT: 3 Advanced RATs for Cryptocurrency Financial Organizations

Recently, an advanced subgroup linked to the notorious threat actor Lazarus was detected distributing three different remote access Trojans (RATs)...
Redazione RHC - 2 September 2025

Taking cyberattacks seriously: the (likely) Albanian cyber aggression and the Iranian responsibility

Annita Larissa Sciacovelli, docente di Diritto internazionale, Università degli Studi di Bari, AB European Agency for cybersecurity – ENISA (pubblicato su Newsletter SIOI, Osservatorio sulle attività delle Organizzazioni Internazionali e...
Share on Facebook Share on LinkedIn Share on X

The History of the Unix Operating System (Part 2)

Author: Carlo DenzaOriginal Publication Date: 07/10/2021Translator: Tara Lie Star Trek IV - The Voyage Home, directed by Leonard Nimoy (USA, 1986, Paramount Pictures): “The starship ‘U.S.S. Enterprise NCC-1701’ and its...
Share on Facebook Share on LinkedIn Share on X

The History of the UNIX operating system (Part 1)

Author: Carlo DenzaOriginal Publication Date: 12/12/2020Translator: Tara Lie This article discusses the history of the Unix operating system (OS), a miracle of modern technology. This OS is used across the world, and is...
Share on Facebook Share on LinkedIn Share on X

Hacker gang OPERA1ER stole $11 million from African companies

Amsterdam, 07.11.2022 — Group-IB has today issued a new report, “OPERA1ER. Playing God without permission,” in collaboration withthe researchers from Orange CERT Coordination Center. The report takes a deep dive into financially motivated attacks of...
Share on Facebook Share on LinkedIn Share on X

The Inventor of the P101 explains to us why Italy is destined to be a perennial “follower”

Author: Massimiliano BrolliOriginal Publication Date: 12/12/2020Translator: Tara Lie Pier Giorgio Perotto (for those who do not know of him) was an Italian electronics pioneer. In the 60’s he worked for Olivetti,...
Share on Facebook Share on LinkedIn Share on X
lockbit

RHC interviews LockBit 3.0. “The main thing is not to start a nuclear war”

Translator: Tara Lie We often talk about the LockBit Ransomware-as-a-Service (RaaS) operation, recently remodelled as LockBit 3.0, which continues to bring important innovations to the ransomware cyber circus. Often these new...
Share on Facebook Share on LinkedIn Share on X

The Superuser Story – The History of #root

Author: Massimiliano BrolliTranslator: Tara Lie In the beginning there was the Word… Computers, before passing into the era of transistors, were cyclopean machines - heavy and hungry for electricity. They used thermionic...
Share on Facebook Share on LinkedIn Share on X

Spacewar! The Story of the First Video Game Created by Hackers at MIT

Author: Massimiliano BrolliOriginal Publication Date: 19/03/2021Translator: Tara Lie In this exciting story, we will catapult ourselves back to 1958 to MIT’s Tech Model Railroad Club and meet Steve Russel, Steve was one...
Share on Facebook Share on LinkedIn Share on X

LockBit 3.0: making the ransomware Great Again

LockBit is a major player in the ransomware scene and has contributed heavily for this cyber-crime model to become one of the most popular and imitated in the threats landscape....
Share on Facebook Share on LinkedIn Share on X

The Founding Fathers of the Hacker Community

Author: Massimiliano BrolliOriginal Publication Date: 19/03/2021Translator: Tara Lie Hacker culture was brought to life thanks to computer scientist Richard Greenblatt and mathematician Bill Gosper at the Massachusetts Institute of Technology (MIT). It...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Cyber Criminals Recruit Insiders: Companies at Risk of Internal Threats
Redazione RHC - 27/12/2025

The cybercriminal community is rapidly increasing its interest in recruiting personnel from within companies . Instead of sophisticated external attacks, criminals are increasingly relying on internal sources— people willing to provide access to company systems…

Immagine del sitoCybercrime
Villager Framework: AI-Powered Penetration Testing Tool
Redazione RHC - 26/12/2025

Straiker’s AI Research (STAR) team has identified Villager, a native AI-based penetration testing framework developed by the Chinese group Cyberspike . The tool, presented as a red team solution , is designed to fully automate…

Immagine del sitoCybercrime
A $500 Tool Claims to Kill EDRs at Kernel Level: Inside the NtKiller Underground Ad
Redazione RHC - 25/12/2025

An ad has surfaced on a closed underground forum frequented by malware operators and initial access brokers, attracting the attention of the cyber threat intelligence community. The post promotes “NtKiller,” a supposed “kernel-level” utility designed…

Immagine del sitoCybercrime
Webrat Malware Targets Security Researchers with GitHub Exploit Traps
Redazione RHC - 24/12/2025

There’s a specific moment, almost always at night, when curiosity overtakes caution. A newly opened repository, few stars but a success. very high score, the README file is well written enough to seem real. This…

Immagine del sitoCybercrime
A backdoor in NVIDIA code. Three 9.8 bugs plague AI and robotics development systems
Redazione RHC - 24/12/2025

When it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it for maintenance purposes or for…