Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

Red Hot Cyber. The Cybersecurity Blog

- June 27th, 2025 - (Posted in Cybercrime and Darknet)
An unusual example of malicious code has been discovered in a real computing environment, which for the first time recorded an attempt to attack not classical defense mechanisms, but directly artificial intelligence systems. We are talking about the prompt injection technique, i.e. the introduction of hidden instructions capable of compromising...
Hacking revolution

Hacking is a Journey, not a Destination

Author: Massimiliano BrolliOriginal Publication Date: 20/07/2020Translator: Tara Lie In this brief article, I will discuss a piece of hacking history: where it all began. Precisely, hacking started in 1958 on the ground floor of Building 26 at MIT (the Massachusetts

Technology Evolution

Vannevar Bush’s Visionary Essay: “As We May Think”.

Author: Massimiliano BrolliOriginal Publication Date: 15/11/2021Translator: Tara Lie Today I would like to bring a visionary essay to light, a source of inspiration for many scientists that have contributed to technological innovation, especially in computer science in the years following

Critical Apache Tomcat Vulnerability CVE-2024-34750 Could Bring Your Server to a Halt!

- July 5th, 2024

The vulnerability CVE-2024-34750 in Apache Tomcat, as described in the security bulletin AL01/240705/CSIRT-ITA, concerns an issue that can be exploited to overload the server's computing resources, leading to a Denial...

  

Threat Actors: Alleged Data Breach of Ukraine Traffic Police

- July 5th, 2024

Recently, a threat actor in an underground forum published an alleged data breach. The leak purportedly involves sensitive information from the Ukraine traffic police (GAI). The data, spanning millions of...

  

Serious Vulnerability in Windows Systems: Here’s How an Attacker Can Gain Complete Control of Your PC

- July 5th, 2024

A severe security vulnerability has been discovered in MSI Center, a widely used software on Windows systems. This flaw, classified as CVE-2024-37726 and with a CVSS score of 7.8 (high), allows a low-privileged attacker...

  

Medusa Ransomware claims responsibility for the attack on Harry Perkins Institute

- July 5th, 2024

On July 3, 2024, the Australian research institute Harry Perkins was the victim of a ransomware attack claimed by MEDUSA on their official DLS. More than 4.6 Terabytes of CCTV...

  

Sign up for the newsletter