Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Banner Mobile
UtiliaCS 970x120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

The Story of Open Source: A Success Story of Humankind Hacking

The Story of Open Source: A Success Story of Humankind

Author: Massimiliano Brolli, Pietro CornelioPublishing Date: 11/01/2021 Open source software is so present and integrated into our daily lives today...
Massimiliano Brolli - 2 July 2025
Do you really know what Hacktivism means? It’s a “special message of hope!” Cybercrime

Do you really know what Hacktivism means? It’s a “special message of hope!”

“Hacktivism, a special message of hope." Thus begins the "Hacktivism Declaration", published on July 4, 2001 by the famous hacker...
Redazione RHC - 2 July 2025
The History of FreeBSD Hacking

The History of FreeBSD

We have often talked about Linux and the open source world, Windows and proprietary software and operating systems in general....
Redazione RHC - 2 July 2025
HoneyPLC: the new honeypot that revolutionizes the defense of industrial plants innovation

HoneyPLC: the new honeypot that revolutionizes the defense of industrial plants

Industrial Control Systems (ICS), critical to the operation of critical infrastructure such as power, water and transportation networks, are increasingly...
Redazione RHC - 2 July 2025
Italian Scientists: Federico Faggin, the Italian who invented the microprocessor. Cybercrime

Italian Scientists: Federico Faggin, the Italian who invented the microprocessor.

Among the illustrious Italian scientists, creators of cutting-edge technological innovations (we have already talked about Per Giorgio Perotto and Leonardo...
Redazione RHC - 1 July 2025
The first message ever sent over the internet Cybercrime

The first message ever sent over the internet

Today exchanging a message via WhatsApp or Skype is a normal gesture, which is part of the activities we carry...
Redazione RHC - 1 July 2025

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Microsoft Copilot Vulnerability Exposes User Data to Hackers
Redazione RHC - 15/01/2026

A recently fixed vulnerability allowed attackers to exploit Microsoft Copilot Personal with a single click to steal sensitive user data. Using a phishing link, attackers were able to take control of sessions without requiring further…

Immagine del sitoCybercrime
Progress Software Patches LoadMaster, MOVEit WAF Vulnerabilities
Redazione RHC - 15/01/2026

On January 12, 2026, Progress Software Corporation released patches that address two high-severity Command Injection vulnerabilities, which could allow remote attackers to execute malicious code on LoadMaster load balancers and MOVEit Web Application Firewalls (WAFs).…

Immagine del sitoCybercrime
24-Year-Old Hacker Breaches US Supreme Court Database
Redazione RHC - 14/01/2026

Do you remember the 24-year-old hacker Carmelo Miano and the breaches of the Naples Prosecutor’s Office’s accounts and computer systems? It appears something similar happened in the United States, and the other young man is…

Immagine del sitoCybercrime
Cloudflare vs Italy: The Battle for Internet Freedom and DNS Control
Redazione RHC - 14/01/2026

Cloudflare CEO Matthew Prince has threatened to shut down the company’s operations in Italy after the country’s telecom regulator fined it twice its annual revenue in the country. The facts The conflict erupted around Italy’s…

Immagine del sitoCybercrime
Cybercrime Meets Real-Life Violence: Foxtrot Network’s Dark Side
Redazione RHC - 13/01/2026

In recent months, there has been increasing talk of a paradigm shift in cybercrime . What for years was perceived as a predominantly digital ecosystem— consisting of fraud, identity theft, online extortion, and cyberattacks —is…