Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
320x100 Itcentric
Fortinet 970x120px

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
AI Alignment: Where Does AI Learn Right and Wrong?
Di Sergio Corpettini - 14/10/2025

The other day on LinkedIn, I found myself having a conversation with someone who was seriously interested in the topic of artificial intelligence applied to law. It wasn’t one of those barroom c...

Immagine del sito
Microsoft Patch Tuesday: 175 vulnerabilities fixed and two zero-days exploited
Di Redazione RHC - 14/10/2025

In its latest update, the tech giant fixed 175 vulnerabilities affecting its core products and underlying systems, including two actively exploited zero-day vulnerabilities , the company said in its l...

Immagine del sito
12 security bugs discovered in Ivanti Endpoint Manager (EPM). Update now!
Di Redazione RHC - 14/10/2025

Ivanti has published 13 vulnerabilities in its Endpoint Manager (EPM) software , including two high-severity flaws that could allow remote code execution and privilege escalation . Despite the lack of...

Immagine del sito
WhatsApp Web in the crosshairs! How the worm that distributes the banking Trojan works
Di Redazione RHC - 14/10/2025

Sophos analysts have discovered a complex malware operation by security experts that uses the popular messaging service WhatsApp to spread banking Trojans, targeting Brazilian banks and cryptocurrency...

Immagine del sito
RMPocalypse: A critical bug in AMD SEV-SNP threatens cloud security.
Di Redazione RHC - 13/10/2025

A critical vulnerability has been identified in the AMD SEV-SNP hardware security architecture, impacting major cloud providers (AWS, Microsoft Azure, and Google Cloud) . This flaw allows malicious hy...

BlackByte: The Return of the Gang after a few months of inactivity

In recent years, the cybersecurity landscape has been marked by ongoing ransomware attacks , with criminal groups constantly evolving to eva...
Pietro Melillo - 24/06/2024 - 14:58

Presumed Cyber Attack on Zerto: Not for Financial or Espionage Purposes but for Political Reasons

Recently, Handala, a malicious actor, posted on a well-known dark web forum, claiming a cyber attack against Zerto, a subsidiary of Hewlett Packard En...
Pietro Melillo - 24/06/2024 - 14:41

Lockbit 3.0 Claims Attack on Federal Reserve: 33 Terabytes of Sensitive Data Allegedly Compromised

In a significant escalation within the cybersecurity realm, the notorious ransomware group Lockbit 3.0 has claimed responsibility for a cyberattack ta...
Pietro Melillo - 24/06/2024 - 07:32

Anubi, the EDR for your malware and network security

In the current modern context where a cyber war is in progress, the concept of cybersecurity awareness and perimeter fortification is increasingly nec...
Andrea Cavallini - 17/06/2024 - 22:10

PRAISE TO VX-UNDERGROUND – The hack-library turns 5!

Every nerd or technology enthusiasts cannot deny the influence of the 1980s on modern computer science. Commodore Amiga, Nintendo, Apple II, now compu...
Alessio Stefan - 19/05/2024 - 06:00

RHC interviews Professor Andrea Morello from the ARC Centre of Excellence for Quantum Computation at the University of New South Wales in Australia

Original Author: Roberto Campagnola, 30 June 2023, Translator: Tara Lie, 14 May 2024 Red Hot Cyber’s Quantum Computing group has interviewed Profes...
Tara Lie - 14/05/2024 - 17:18

BlackByte: The Return of the Gang after a few months of inactivity

- June 24th, 2024

In recent years, the cybersecurity landscape has been marked by ongoing ransomware attacks , with criminal groups constantly evolving to evade defenses. One such group, known as BlackByte, recently returned to action...

Facebook Linkedin X

Presumed Cyber Attack on Zerto: Not for Financial or Espionage Purposes but for Political Reasons

- June 24th, 2024

Recently, Handala, a malicious actor, posted on a well-known dark web forum, claiming a cyber attack against Zerto, a subsidiary of Hewlett Packard Enterprise (HPE). Zerto is renowned for its...

Facebook Linkedin X

Lockbit 3.0 Claims Attack on Federal Reserve: 33 Terabytes of Sensitive Data Allegedly Compromised

- June 24th, 2024

In a significant escalation within the cybersecurity realm, the notorious ransomware group Lockbit 3.0 has claimed responsibility for a cyberattack targeting the Federal Reserve of the United States. The declaration...

Facebook Linkedin X

Anubi, the EDR for your malware and network security

- June 17th, 2024

In the current modern context where a cyber war is in progress, the concept of cybersecurity awareness and perimeter fortification is increasingly necessary. In this situation, target objectives are spread...

Facebook Linkedin X

PRAISE TO VX-UNDERGROUND – The hack-library turns 5!

- May 19th, 2024

Every nerd or technology enthusiasts cannot deny the influence of the 1980s on modern computer science. Commodore Amiga, Nintendo, Apple II, now computers are affordable to everyone who could finally...

Facebook Linkedin X

RHC interviews Professor Andrea Morello from the ARC Centre of Excellence for Quantum Computation at the University of New South Wales in Australia

- May 14th, 2024

Original Author: Roberto Campagnola, 30 June 2023, Translator: Tara Lie, 14 May 2024 Red Hot Cyber’s Quantum Computing group has interviewed Professor Andrea Morello. Professor Morello is an Italian scientist,...

Facebook Linkedin X
Most Read Articles of the Month Most Read Articles of the Week
  1. The Truth About Windows XP License Key: FCKGW-RHQQ2-YXRKT-8TG6W-2B7Q8
  2. Computer science graduates with no future! Thousands of resumes ignored, and goodbye to six-figure salaries.
  3. With 50 dollars and physical access to the server, the Cloud goes to hell
  4. Shocking collapse: -71% of job offers for software engineers in three years
  5. Hackers hit the United States: critical federal infrastructure compromised
  1. The Truth About Windows XP License Key: FCKGW-RHQQ2-YXRKT-8TG6W-2B7Q8
  2. Microsoft 365 Outage: Thousands of Users Affected Worldwide
  3. Is your VPN protecting you or spying on you? 800 free VPNs analyzed with disturbing results.
  4. GitHub is migrating to Azure! And goodbye to new development for a year.
  5. Hacker culture pioneer Peter Samson plays “Boards of Canada” on PDP-1

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE