Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The Russian Federation’s Roskomnadzor has announced that it continues to impose systematic restrictions on the messaging app WhatsApp due to violations of Russian law. According to the agency, the s...

The Shai-Hulud worm has spread beyond the npm ecosystem and was discovered in Maven . Socket specialists noticed an infected package on Maven Central containing the same malicious components used in t...

Artificial intelligence is currently capable of performing work equivalent to 11.7% of US employment . And not just in theory: in terms of monetary value, this value is already comparable to the salar...

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...
The History of the Linux Kernel (2 of 2). Early Hackers Up to Version 1.0.
The History of the Linux Kernel (1 of 2). From Torvalds to the Hacker Community
Cult of the Dead Cow (cDc). The story of the most famous hacker group.
Apple 2: the story of a great success.
Russian domestic hackers Cozy Bear (APT29). Analysis of the main attacks and their TTPs.
Critical Vulnerability in FortiWeb: Score 9.6 and Unauthorized SQL Commands

The History of the Linux Kernel (2 of 2). Early Hackers Up to Version 1.0.
Redazione RHC - July 12th, 2025
Article by Pietro Cornelio and Massimiliano Brolli Previous articles: The history of the Linux Kernel (1 of 2). From Torvalds to the hacker community In the first article we met...

The History of the Linux Kernel (1 of 2). From Torvalds to the Hacker Community
Redazione RHC - July 12th, 2025
Article by Pietro Cornelio and Massimiliano Brolli The history of the Linux Kernel is a story of pure hacking as well as being a miracle of "collaboration". It is the...

Cult of the Dead Cow (cDc). The story of the most famous hacker group.
Redazione RHC - July 12th, 2025
Hacker culture, as we've already discussed, is a fascinating subject that has evolved significantly over time to reach the present day. We talked about its origins in a video dedicated...

Apple 2: the story of a great success.
Redazione RHC - July 12th, 2025
On June 10, 1977, the Apple II went on sale, the historic microcomputer that kicked off the home computing revolution. We'd like to dedicate an article to its history. The...

Russian domestic hackers Cozy Bear (APT29). Analysis of the main attacks and their TTPs.
Redazione RHC - July 12th, 2025
Author: Gianluca Tiepolo APT29 is a highly sophisticated Advanced Persistent Threat (APT) group that has been attributed to Russia's Foreign Intelligence Service (SVR). The group has been active since at...

Critical Vulnerability in FortiWeb: Score 9.6 and Unauthorized SQL Commands
Redazione RHC - July 12th, 2025
A new vulnerability, tracked under CVE-2025-25257, was recently published affecting several versions of Fortinet FortiWeb. This vulnerability could allow unauthenticated attackers to execute unauthorized SQL commands via forged HTTP/S requests....
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

