Red Hot Cyber. The Cybersecurity Blog
Theft at the Louvre: The surveillance system’s password “LOUVRE” has put the museum in crisis.
We recently published an in-depth article on the “theft of the century” at the Louvre , in which we highlighted how physical security – access, environmental control, surveillance – is now...
Discover the Dark Web: Access, Secrets, and Helpful Links to the Onion Network
Have you always thought that the Dark Web is frequented by cybercriminals? Have you always thought that the Dark Web is a dangerous and treacherous network? Today we want to dispel this myth and raise...
AWS and Azure Disruption: Vendor Dependence Is a Serious Risk
On October 29, a massive outage of Microsoft ‘s Azure cloud platform caused global disruptions, disrupting business and public services for over eight hours. The incident affected numerous custo...
Windows 7 Shrinks to 69MB: A Minimalist’s Achievement
Windows minimalists have set another record. Enthusiast @XenoPanther has reduced the size of a running copy of Windows 7 to 69 megabytes , smaller than the average mobile app. By comparison, a standar...
OpenAI may have lost $12 billion in its latest fiscal quarter.
Microsoft’s financial report indicates that OpenAI may have lost $12 billion in its latest fiscal quarter. An expense in Microsoft’s earnings report (517.81, -7.95, -1.51%) surprised analy...
The Louvre Theft: When Thieves Taught the World the Physical Pen Test
The event that shook the world on October 19, 2025, was not a natural disaster or a financial collapse, but the sensational theft of Napoleon’s jewels from the Louvre Museum. Beyond its historic...
Starting November 12th, age verification for porn sites will be implemented in Italy. What’s changing?
Starting Tuesday, November 12, 2025, new provisions from the Italian Communications Regulatory Authority (AGCOM) will come into force, requiring an age verification system for accessing pornographic w...
AzureHound: The “Legitimate” Tool for Cloud Attacks
AzureHound, part of the BloodHound suite, was born as an open-source tool to help security teams and red teams identify vulnerabilities and escalation paths in Microsoft Azure and Entra ID environment...
Red Hot Cyber launches free real-time CVE Enrichment service
Timeliness is key in cybersecurity. Red Hot Cyber recently launched a completely free service that allows IT professionals, security analysts, and enthusiasts to monitor the most critical vulnerabilit...
Mossad, the rigged supply chain, and intimidated judges
Yossi Cohen, former director of the Mossad, has said publicly two things that usually remain locked away in a room without tape recorders. First, Israel allegedly deployed a global sabotage and survei...
Featured Articles

We recently published an in-depth article on the “theft of the century” at the Louvre , in which we highlighted how physical security – access, environmental control, surveillance – is...

Have you always thought that the Dark Web is frequented by cybercriminals? Have you always thought that the Dark Web is a dangerous and treacherous network? Today we want to dispel this myth and raise...

On October 29, a massive outage of Microsoft ‘s Azure cloud platform caused global disruptions, disrupting business and public services for over eight hours. The incident affected numerous custo...

Windows minimalists have set another record. Enthusiast @XenoPanther has reduced the size of a running copy of Windows 7 to 69 megabytes , smaller than the average mobile app. By comparison, a standar...

Microsoft’s financial report indicates that OpenAI may have lost $12 billion in its latest fiscal quarter. An expense in Microsoft’s earnings report (517.81, -7.95, -1.51%) surprised analy...
Data Brokers: How Law Enforcement Rely on Inaccurate Data to Supplement Investigations
The “Mother of all Demos”. Douglas Englebart’s Vision of the Future
Vannevar Bush’s Visionary Essay: “As We May Think”.
RHC ransomware Data Room – January 2022
Satoshi Nakamoto: let’s discover the mysterious inventor of Bitcoin.
Nuclear rearmament, cyber guerrillas and cyber crime.

Data Brokers: How Law Enforcement Rely on Inaccurate Data to Supplement Investigations
Olivia Terragni - June 15th, 2022
Author: Jesse McGraw, alias Ghost ExodusPublication date: 11/06/2022 Government public record databases apparently help law enforcement officials save lives, prevent further crimes from being committed by perpetrators, and also provide...

The “Mother of all Demos”. Douglas Englebart’s Vision of the Future
Tara Lie - May 12th, 2022
Author: Massimiliano BrolliOriginal Publication Date: 12/05/2022Translator: Tara Lie The “Mother of all Demos'' is the name retrospectively used by journalist Steven Levy, in his 1994 book ‘Insanely Great’, to describe a revolutionary...

Vannevar Bush’s Visionary Essay: “As We May Think”.
Tara Lie - May 7th, 2022
Author: Massimiliano BrolliOriginal Publication Date: 15/11/2021Translator: Tara Lie Today I would like to bring a visionary essay to light, a source of inspiration for many scientists that have contributed to...

RHC ransomware Data Room – January 2022
Luca Mella - February 4th, 2022
Author: Dott. Luca Mella, Cyber Security Expert (founder doubleextortion.com) Translate: Vincenzo Marcovecchio Pubblication Date: 5/02/2022 In recent years, the ransomware phenomenon has been so disruptive that it heavily influences the...

Satoshi Nakamoto: let’s discover the mysterious inventor of Bitcoin.
Massimiliano Brolli - January 27th, 2022
Autore: Brolli Massimiliano Translate: Vincenzo Marcovecchio Pubblication date: 1/06/2021 The true identity of the creator of Bitcoin is one of the greatest mysteries in the tech world. Over the years,...

Nuclear rearmament, cyber guerrillas and cyber crime.
Roberto Villani - January 10th, 2022
Author: Roberto Villani Tanslate: Vincenzo Marcovecchio Pubblication date: 19/12/2021 Why will the cyberg wars, indeed the cyber-guerrillas, be more and more present and involve us more and more? The short...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

