Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Latest news

Discover Quantum Computing innovation

Discover Quantum Computing

Welcome to the Red Hot Cyber community’s Quantum Technology Group page. The themed group will be lead by industry experts,...
Tara Lie - March 20, 2024
How CDNs can save your website: Speed and security at the highest level Cybercrime

How CDNs can save your website: Speed and security at the highest level

Let's talk a bit about CDNs, or Content Delivery Networks, and how they can be real digital lifesavers. Imagine being...
Antonio Piovesan - March 18, 2024
Mathematics Meets Programming: A transformation journey Culture

Mathematics Meets Programming: A transformation journey

Discover the Magic of Programming Through the Charm of Mathematics: A Journey of Growth and Learning Good morning everyone, I’m Davide...
Davide Cavallini - March 11, 2024
Scam Alert: How I Almost Fell for a Million-Dollar Cybercrime

Scam Alert: How I Almost Fell for a Million-Dollar

My name is Elena and I am a 35-year-old housewife. One day, while I was checking my email, I found...
Antonio Piovesan - March 9, 2024
HijackLoader Expands Techniques to Improve Defense Evasion  Vulnerability

HijackLoader Expands Techniques to Improve Defense Evasion 

Donato Onofri e Emanuele Calvelli Endpoint Security & XDR CrowdStrike. HijackLoader continues to become increasingly popular among adversaries for deploying additional payloads...
Agostino Pellegrino - February 22, 2024
The Deception of the Wallet: A Journey into the World of Scammers Culture

The Deception of the Wallet: A Journey into the World of Scammers

Giorgio sat in the self-help circle, the dim candlelight dancing on the walls. The eyes of the other participants were...
Antonio Piovesan - February 16, 2024
Signal towards the Future: Post Quantum Cryptography now protects our messages innovation

Signal towards the Future: Post Quantum Cryptography now protects our messages

Translator: Tara Lie Signal has announced that it has improved encryption within its messenger application. Its end-to-end communication protocol now...
Tara Lie - September 25, 2023
Unveiling the Dark Secrets of Sql Injection Attacks – Learn How to Protect Your Data! Hacking

Unveiling the Dark Secrets of Sql Injection Attacks – Learn How to Protect Your Data!

Good morning everyone. I am Davide Cavallini, a Senior Laravel Developer and Penetration Tester. Today, I will talk to you...
Davide Cavallini - July 26, 2023
RHC interviews 8base: The cybergang that provides the security AUDIT report to the hacked company Cybercrime

RHC interviews 8base: The cybergang that provides the security AUDIT report to the hacked company

A few days ago we published an article on the new cybergang 8Base. 8base define themselves as “honest and simple...
Pietro Melillo - July 14, 2023
Taking cyberattacks seriously: the (likely) Albanian cyber aggression and the Iranian responsibility Cyber News

Taking cyberattacks seriously: the (likely) Albanian cyber aggression and the Iranian responsibility

Annita Larissa Sciacovelli, docente di Diritto internazionale, Università degli Studi di Bari, AB European Agency for cybersecurity – ENISA (pubblicato...
Redazione RHC - March 30, 2023
The History of the Unix Operating System (Part 2) Culture

The History of the Unix Operating System (Part 2)

Author: Carlo DenzaOriginal Publication Date: 07/10/2021Translator: Tara Lie Star Trek IV - The Voyage Home, directed by Leonard Nimoy (USA,...
Carlo Denza - January 31, 2023
The History of the UNIX operating system (Part 1) innovation

The History of the UNIX operating system (Part 1)

Author: Carlo DenzaOriginal Publication Date: 12/12/2020Translator: Tara Lie This article discusses the history of the Unix operating system (OS), a miracle of modern...
Carlo Denza - December 28, 2022

The Reversal of the Brain Cipher Group after the Attack on Indonesia Terkoneksi

In recent days, the ransomware group known as Brain Cipher severely hit the data center of Indonesia Terkoneksi, an attack that crippled the company's technological infrastructure. However, in a surprising...

Intel CPUs Vulnerable! New “Indirector” Attack Threatens Sensitive Data Detection.

Modern Intel processors, including Raptor Lake and Alder Lake CPUs (i.e., 12th and 13th generation Intel "Core" processors), are vulnerable to a new high-precision Branch Target Injection (BTI) attack called...

Threat Actors Release 2022 Electronic Arts (EA) Employee Database

Recently, a threat actor allegedly leaked a database containing information on Electronic Arts (EA) employees from 2022. The data breach was confirmed by the threat actor himself, who explained the...

OpenSSH: An RCE run as Root puts 14 million instances on Linux at risk

A recent critical vulnerability in OpenSSH, identified as CVE-2024-6387, could allow unauthenticated remote code execution with root privileges on glibc-based Linux systems. This flaw resides in the server component of...

Possible Data Breach of the Internal Security Operations Command (ISOC)

A member of BreachForums has announced a significant data breach involving Thailand's Internal Security Operations Command (ISOC), an agency known as the political arm of the Royal Thai Armed Forces....

Bulgarian Hacker “Emil Külev” Arrested

On June 30, 2024, the Sofia police arrested Teodor Iliev, a 21-year-old Bulgarian who called himself "Emil Külev" online. The announcement was made by the Prosecutor's Office of the Republic...

Cybercriminals exploit ARC popularity to spread Poseidon Malware : Mac users are the target!

In teh last months Mac users have been targeted by a new wave of cyberattack trough malvertising campaigns. The last threat, called “Poseidon” by their creators, has been revealed this...

Juniper Networks Releases Security Updates for a Critical 10.0 Vulnerability

Juniper Networks has recently announced the release of out-of-band security updates to address a severe vulnerability that could lead to an authentication bypass in some of its routers. This vulnerability,...

Allegedly Data Breach: Kemenkumham Email Credentials Compromised

A significant data breach has involved the Ministry of Law and Human Rights (Kemenkumham) in Indonesia. According to a post on a hacker forum, a threat actor under the pseudonym...

Coinbase USA: Threat Actor Claims to Sell Database of 600,000 Users

In the past few hours, a new and alarming cyber threat has emerged. A threat actor has claimed to possess and intends to sell a database containing information on 600,000...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE