Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
LECS 320x100 1
Redhotcyber Banner Sito 970x120px Uscita 101125

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Jupiter, the exascale supercomputer that aims to revolutionize AI in Europe Cybercrime

Jupiter, the exascale supercomputer that aims to revolutionize AI in Europe

The Jupiter supercomputer, inaugurated at the Jülich Supercomputing Center in Germany, represents a milestone for Europe. It is the continent's...
Redazione RHC - 6 September 2025
38 million Italian phone numbers for sale on the dark web. It’s smishing! Cybercrime

38 million Italian phone numbers for sale on the dark web. It’s smishing!

Seven out of ten Italians have their phone numbers included in this database. But what does it mean to have...
Redazione RHC - 6 September 2025
Apitor, the first robot that helps children do their homework and the whistleblower for China Cybercrime

Apitor, the first robot that helps children do their homework and the whistleblower for China

The U.S. Department of Justice has filed a lawsuit against Apitor Technology, accusing it of secretly collecting children's location data...
Redazione RHC - 6 September 2025
Hackable restaurant robots could serve sushi… at the attacker’s home. Cybercrime

Hackable restaurant robots could serve sushi… at the attacker’s home.

An independent security specialist, known by the nickname BobDaHacker, discovered security flaws in Pudu Robotics (the world's leading provider of...
Redazione RHC - 6 September 2025
LECS powered by Cyber Evolution: la prima black box NDR completamente Made in Italy Cybercrime

LECS powered by Cyber Evolution: la prima black box NDR completamente Made in Italy

In the current cybersecurity landscape, threats are moving ever faster and more sophisticated. Traditional defense tools are no longer sufficient...
Redazione RHC - 6 September 2025
AI A2 detected 102 0-day bugs and created exploits in Android apps for $1.77 Cybercrime

AI A2 detected 102 0-day bugs and created exploits in Android apps for $1.77

Artificial intelligence systems have been criticized for creating confusing vulnerability reports and inundating open-source developers with irrelevant complaints. But researchers...
Redazione RHC - 6 September 2025

Data Brokers: How Law Enforcement Rely on Inaccurate Data to Supplement Investigations

Author: Jesse McGraw, alias Ghost ExodusPublication date: 11/06/2022 Government public record databases apparently help law enforcement officials save lives, prevent further crimes from being committed by perpetrators, and also provide...
Share on Facebook Share on LinkedIn Share on X

The “Mother of all Demos”. Douglas Englebart’s Vision of the Future

Author: Massimiliano BrolliOriginal Publication Date: 12/05/2022Translator: Tara Lie The “Mother of all Demos'' is the name retrospectively used by journalist Steven Levy, in his 1994 book ‘Insanely Great’, to describe a revolutionary...
Share on Facebook Share on LinkedIn Share on X

Vannevar Bush’s Visionary Essay: “As We May Think”.

Author: Massimiliano BrolliOriginal Publication Date: 15/11/2021Translator: Tara Lie Today I would like to bring a visionary essay to light, a source of inspiration for many scientists that have contributed to...
Share on Facebook Share on LinkedIn Share on X

RHC ransomware Data Room – January 2022

Author: Dott. Luca Mella, Cyber Security Expert (founder doubleextortion.com) Translate: Vincenzo Marcovecchio Pubblication Date: 5/02/2022 In recent years, the ransomware phenomenon has been so disruptive that it heavily influences the...
Share on Facebook Share on LinkedIn Share on X

Why privacy does not exist

Privacy, privacy, privacy, ... privacy comes first. How many times have we heard this sentence? Yes, because we talk a lot about this topic, we talk about it at work,...
Share on Facebook Share on LinkedIn Share on X

Electronic warfare between the USA, China, South and North Korea (part two)

Author: Olivia TerragniPubblication Date: 13/12/2021 Given that North Korean cyberattacks are not a future threat, but already a FACT, we are already wondering how to deal with the election of...
Share on Facebook Share on LinkedIn Share on X

North Korea’s cyberwarfare and its cyber army (part one)

Author: Olivia Terragni During the night, only one bright spot lights up in North Korea: the city of Pyongyang. Perhaps, due to the dark that surrounds it, we understand so...
Share on Facebook Share on LinkedIn Share on X

Making the cyber world a safer and better place: an interview with W1ntermute

Author: Olivia terragni Pubblication Date: 11/11/2021 W1ntermute aka Sofya Ivanov is a woman who works in the cybersecurity industry as a network security analyst and open-source intelligence (OSINT) specialist. This...
Share on Facebook Share on LinkedIn Share on X

Ada Lovelace and Charles Babbage, pioneers of programmable computing

Author: Antonio Piovesan Great Britain, middle decades of the 19th century, times of unprecedented engineering ambitions. Engineering, transportation, communications, architecture, science and manufacturing are in a feverish state of evolution....
Share on Facebook Share on LinkedIn Share on X

Dharma/Crysis: Overview and adversary tracking

Author: Emanuele De Lucia Pubblication date: 17/09/2021 This report presents an overview about Dharma/Crysis ransomware. This piece of malware is often observed as late-stage payload in attacks against internet-facing systems,...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
ESXi Zero-Day Exploit: How to Protect Your VMware Environment
Redazione RHC - 20/01/2026

A group of attackers is using a zero-day exploit toolkit to compromise VMware ESXi instances in an uncontrolled manner, taking advantage of multiple vulnerabilities to bypass virtual machine restrictions. The current incident highlights the ongoing…

Immagine del sitoCybercrime
Google Fast Pair Vulnerability: WhisperPair Exposes Millions of Devices
Redazione RHC - 19/01/2026

Researchers from the Cybersecurity and Industrial Cryptography team at KU Leuven have discovered a critical flaw in the Google Fast Pair protocol. The vulnerability allows attackers to hijack control of millions of Bluetooth devices, track…

Immagine del sitoCybercrime
Elon Musk Sues OpenAI for $134 Billion Over AI Betrayal
Redazione RHC - 19/01/2026

Elon Musk has filed a staggering $134 billion in damages in a malicious lawsuit against OpenAI and Microsoft. According to Bloomberg , the latest lawsuit accuses OpenAI of betraying its core mission as a nonprofit…

Immagine del sitoCulture
Net-NTLMv1 Exploitation: Rainbow Tables for Modern Attacks
Redazione RHC - 18/01/2026

Mandiant has released a large set of rainbow tables dedicated to Net-NTLMv1 with the aim of concretely demonstrating how insecure this authentication protocol has become. Although Net-NTLMv1 has been deprecated for years and its weaknesses…

Immagine del sitoCybercrime
Your paycheck is zero! Congratulations, someone answered the phone wrong
Redazione RHC - 18/01/2026

No worker would accept their paycheck disappearing without explanation. It was precisely from a series of internal reports of this nature that an organization began investigating an apparently administrative anomaly, discovering instead a targeted cyber…