Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Fortinet 320x100px
970x120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
WhatsApp Blocked in Russia: Messaging App Faces Crackdown
Di Redazione RHC - 28/11/2025

The Russian Federation’s Roskomnadzor has announced that it continues to impose systematic restrictions on the messaging app WhatsApp due to violations of Russian law. According to the agency, the s...

Immagine del sito
Shai-Hulud Worm Spreads Beyond npm, Attacks Maven
Di Redazione RHC - 28/11/2025

The Shai-Hulud worm has spread beyond the npm ecosystem and was discovered in Maven . Socket specialists noticed an infected package on Maven Central containing the same malicious components used in t...

Immagine del sito
11.7% of jobs could be replaced by artificial intelligence
Di Redazione RHC - 28/11/2025

Artificial intelligence is currently capable of performing work equivalent to 11.7% of US employment . And not just in theory: in terms of monetary value, this value is already comparable to the salar...

Immagine del sito
Tor Boosts Security with Counter Galois Onion CGO Encryption
Di Redazione RHC - 27/11/2025

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

Immagine del sito
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Di Redazione RHC - 26/11/2025

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Linux Pwned! Privilege Escalation on SUDO in 5 seconds. HackerHood tests the CVE-2025-32463 exploit

Yesterday, Red Hot Cyber published an in-depth analysis of a gserious vulnerability discovered in SUDO (CVE-2025-32463), which allows escalation of pr...
Redazione RHC - 02/07/2025 - 13:06

North Korean Hackers on the Payroll: How Companies Paid Salaries to North Korean IT Specialists

The US Department of Justice has announced the discovery ofa large-scale scheme in which fake IT specialists from the DPRK obtained jobs at American c...
Redazione RHC - 02/07/2025 - 12:14

The Story of Open Source: A Success Story of Humankind

Author: Massimiliano Brolli, Pietro CornelioPublishing Date: 11/01/2021 Open source software is so present and integrated into our daily lives toda...
Massimiliano Brolli - 02/07/2025 - 07:52

Do you really know what Hacktivism means? It’s a “special message of hope!”

“Hacktivism, a special message of hope." Thus begins the "Hacktivism Declaration", published on July 4, 2001 by the famous hacker group Cult of the de...
Redazione RHC - 02/07/2025 - 07:48

The History of FreeBSD

We have often talked about Linux and the open source world, Windows and proprietary software and operating systems in general. But starting from th...
Redazione RHC - 02/07/2025 - 07:42

HoneyPLC: the new honeypot that revolutionizes the defense of industrial plants

Industrial Control Systems (ICS), critical to the operation of critical infrastructure such as power, water and transportation networks, are increasin...
Redazione RHC - 02/07/2025 - 07:38

Linux Pwned! Privilege Escalation on SUDO in 5 seconds. HackerHood tests the CVE-2025-32463 exploit

- July 1st, 2025

Yesterday, Red Hot Cyber published an in-depth analysis of a gserious vulnerability discovered in SUDO (CVE-2025-32463), which allows escalation of privileges to root in Linux environments by exploiting an abuse...

Facebook Linkedin X

North Korean Hackers on the Payroll: How Companies Paid Salaries to North Korean IT Specialists

- July 1st, 2025

The US Department of Justice has announced the discovery ofa large-scale scheme in which fake IT specialists from the DPRK obtained jobs at American companies by posing as citizens of...

Facebook Linkedin X

The Story of Open Source: A Success Story of Humankind

- July 1st, 2025

Author: Massimiliano Brolli, Pietro CornelioPublishing Date: 11/01/2021 Open source software is so present and integrated into our daily lives today that it would be difficult to think of a world...

Facebook Linkedin X

Do you really know what Hacktivism means? It’s a “special message of hope!”

- July 1st, 2025

“Hacktivism, a special message of hope." Thus begins the "Hacktivism Declaration", published on July 4, 2001 by the famous hacker group Cult of the dead Cow (also called cDc or...

Facebook Linkedin X

The History of FreeBSD

- July 1st, 2025

We have often talked about Linux and the open source world, Windows and proprietary software and operating systems in general. But starting from the seed of Ken Thompson's Unix, many...

Facebook Linkedin X

HoneyPLC: the new honeypot that revolutionizes the defense of industrial plants

- July 1st, 2025

Industrial Control Systems (ICS), critical to the operation of critical infrastructure such as power, water and transportation networks, are increasingly vulnerable to cyberattacks. In this context, the article HoneyPLC: A...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE