Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Banner Ancharia Mobile 1
Fortinet 970x120px

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
WhatsApp Blocked in Russia: Messaging App Faces Crackdown
Di Redazione RHC - 28/11/2025

The Russian Federation’s Roskomnadzor has announced that it continues to impose systematic restrictions on the messaging app WhatsApp due to violations of Russian law. According to the agency, the s...

Immagine del sito
Shai-Hulud Worm Spreads Beyond npm, Attacks Maven
Di Redazione RHC - 28/11/2025

The Shai-Hulud worm has spread beyond the npm ecosystem and was discovered in Maven . Socket specialists noticed an infected package on Maven Central containing the same malicious components used in t...

Immagine del sito
11.7% of jobs could be replaced by artificial intelligence
Di Redazione RHC - 28/11/2025

Artificial intelligence is currently capable of performing work equivalent to 11.7% of US employment . And not just in theory: in terms of monetary value, this value is already comparable to the salar...

Immagine del sito
Tor Boosts Security with Counter Galois Onion CGO Encryption
Di Redazione RHC - 27/11/2025

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

Immagine del sito
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Di Redazione RHC - 26/11/2025

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

The History of the Linux Kernel (2 of 2). Early Hackers Up to Version 1.0.

Article by Pietro Cornelio and Massimiliano Brolli Previous articles: The history of the Linux Kernel (1 of 2). From Torvalds to the hacker community ...
Redazione RHC - 13/07/2025 - 12:25

The History of the Linux Kernel (1 of 2). From Torvalds to the Hacker Community

Article by Pietro Cornelio and Massimiliano Brolli The history of the Linux Kernel is a story of pure hacking as well as being a miracle of "collab...
Redazione RHC - 13/07/2025 - 12:19

Cult of the Dead Cow (cDc). The story of the most famous hacker group.

Hacker culture, as we've already discussed, is a fascinating subject that has evolved significantly over time to reach the present day. We talked abou...
Redazione RHC - 13/07/2025 - 12:11

Apple 2: the story of a great success.

On June 10, 1977, the Apple II went on sale, the historic microcomputer that kicked off the home computing revolution. We'd like to dedicate an articl...
Redazione RHC - 13/07/2025 - 12:07

Russian domestic hackers Cozy Bear (APT29). Analysis of the main attacks and their TTPs.

Author: Gianluca Tiepolo APT29 is a highly sophisticated Advanced Persistent Threat (APT) group that has been attributed to Russia's Foreign Intell...
Redazione RHC - 13/07/2025 - 12:02

Critical Vulnerability in FortiWeb: Score 9.6 and Unauthorized SQL Commands

A new vulnerability, tracked under CVE-2025-25257, was recently published affecting several versions of Fortinet FortiWeb. This vulnerability could al...
Redazione RHC - 13/07/2025 - 11:54

The History of the Linux Kernel (2 of 2). Early Hackers Up to Version 1.0.

- July 12th, 2025

Article by Pietro Cornelio and Massimiliano Brolli Previous articles: The history of the Linux Kernel (1 of 2). From Torvalds to the hacker community In the first article we met...

Facebook Linkedin X

The History of the Linux Kernel (1 of 2). From Torvalds to the Hacker Community

- July 12th, 2025

Article by Pietro Cornelio and Massimiliano Brolli The history of the Linux Kernel is a story of pure hacking as well as being a miracle of "collaboration". It is the...

Facebook Linkedin X

Cult of the Dead Cow (cDc). The story of the most famous hacker group.

- July 12th, 2025

Hacker culture, as we've already discussed, is a fascinating subject that has evolved significantly over time to reach the present day. We talked about its origins in a video dedicated...

Facebook Linkedin X

Apple 2: the story of a great success.

- July 12th, 2025

On June 10, 1977, the Apple II went on sale, the historic microcomputer that kicked off the home computing revolution. We'd like to dedicate an article to its history. The...

Facebook Linkedin X

Russian domestic hackers Cozy Bear (APT29). Analysis of the main attacks and their TTPs.

- July 12th, 2025

Author: Gianluca Tiepolo APT29 is a highly sophisticated Advanced Persistent Threat (APT) group that has been attributed to Russia's Foreign Intelligence Service (SVR). The group has been active since at...

Facebook Linkedin X

Critical Vulnerability in FortiWeb: Score 9.6 and Unauthorized SQL Commands

- July 12th, 2025

A new vulnerability, tracked under CVE-2025-25257, was recently published affecting several versions of Fortinet FortiWeb. This vulnerability could allow unauthenticated attackers to execute unauthorized SQL commands via forged HTTP/S requests....

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE