Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
320x100 Itcentric
970x120 Olympous

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

RHC interviews RADAR and DISPOSSESSOR: “When it comes to security, the best defense is a good offense.” Cybercrime

RHC interviews RADAR and DISPOSSESSOR: “When it comes to security, the best defense is a good offense.”

In our usual underground analysis activities, we came into contact with the cyber gang DISPOSSESSOR, which came to attention in...
RHC Dark Lab - 25 July 2024
IntelBroker Strikes Again: Unauthorized Access to Two Major American Companies Up for Sale Cybercrime

IntelBroker Strikes Again: Unauthorized Access to Two Major American Companies Up for Sale

IntelBroker strikes again, announcing the sale of unauthorized access to two major American companies, each with revenues reaching hundreds of...
Raffaela Crisci - 24 July 2024
Exposed the Data of 3,379 Spanish Doctors! When Fraud Becomes “On-Target” Cybercrime

Exposed the Data of 3,379 Spanish Doctors! When Fraud Becomes “On-Target”

Recently, a threat actor in an underground forum called Breach Forums published an alleged data breach. The post claims to...
Redazione RHC - 24 July 2024
The other side of cybersecurity: stress and burnout are “by design” in domain experts innovation

The other side of cybersecurity: stress and burnout are “by design” in domain experts

We often talk about cyber security and the importance of a complete cyber program today. Today, however, we will focus...
Redazione RHC - 23 July 2024
Musk’s Supercomputer in Memphis is ready! 100,000 liquid-cooled Nvidia H1s. innovation

Musk’s Supercomputer in Memphis is ready! 100,000 liquid-cooled Nvidia H1s.

Elon Musk, who simultaneously heads six innovative companies-Tesla, SpaceX, Starlink, X (formerly known as Twitter), Neuralink, and xAI-is not stopping...
Redazione RHC - 23 July 2024
Microsoft releases USB tool to fix CrowdStrike BSOD problem on Windows 10 and 11 Vulnerability

Microsoft releases USB tool to fix CrowdStrike BSOD problem on Windows 10 and 11

Microsoft has released a tool for system administrators to simplify the process of fixing the blue screen of death (BSOD)...
Redazione RHC - 23 July 2024

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
24-Year-Old Hacker Breaches US Supreme Court Database
Redazione RHC - 14/01/2026

Do you remember the 24-year-old hacker Carmelo Miano and the breaches of the Naples Prosecutor’s Office’s accounts and computer systems? It appears something similar happened in the United States, and the other young man is…

Immagine del sitoCybercrime
Cloudflare vs Italy: The Battle for Internet Freedom and DNS Control
Redazione RHC - 14/01/2026

Cloudflare CEO Matthew Prince has threatened to shut down the company’s operations in Italy after the country’s telecom regulator fined it twice its annual revenue in the country. The facts The conflict erupted around Italy’s…

Immagine del sitoCybercrime
Cybercrime Meets Real-Life Violence: Foxtrot Network’s Dark Side
Redazione RHC - 13/01/2026

In recent months, there has been increasing talk of a paradigm shift in cybercrime . What for years was perceived as a predominantly digital ecosystem— consisting of fraud, identity theft, online extortion, and cyberattacks —is…

Immagine del sitoCybercrime
Iran Cyber Crisis: Connettività Compromised
Roberto Villani - 13/01/2026

Sometimes important things don’t arrive at a press conference. They arrive like a graph that stops breathing: the connectivity line collapses, the OSINT dries up, the noise grows as the signal disappears. In Iran, the…

Vulnerability
ServiceNow AI Vulnerability CVE-2025-12420: Critical Security Risk
Redazione RHC - 13/01/2026

A critical flaw has been identified in ServiceNow’s artificial intelligence platform, with a severity score of 9.3 out of 10. This vulnerability, classified as CVE-2025-12420, could allow attackers to impersonate legitimate users without authenticating. ServiceNow…