Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Latest news

Is the end of state-led cyberspace invasions coming? The 56-page draft prepared by the UN Cyber News

Is the end of state-led cyberspace invasions coming? The 56-page draft prepared by the UN

The eleventh final session of the Open-Ended Working Group (OEWG) on cybersecurity opened at the United Nations Headquarters in New...
Sandro Sana - July 9, 2025
Claude Shannon: Father of Cryptography and Founder of the Information Age Cybercrime

Claude Shannon: Father of Cryptography and Founder of the Information Age

Whoever has as a mission, to deal with computer security and therefore also with cryptography, must necessarily pass through the...
Carlo Denza - July 8, 2025
Who are the most famous hackers in history? Cyber News

Who are the most famous hackers in history?

We often talk about hackers, but who are the famous hackers that ever existed? Considered by many as eccentric geniuses...
Silvia Felici - July 8, 2025
Underwater cables and the “cyber war of the seabed”. Between control, geopolitics and technology Cyber News

Underwater cables and the “cyber war of the seabed”. Between control, geopolitics and technology

Author: 5ar0m4n Publishing Date: 11/7/2021 We have often addressed the topic of undersea cables on RHC where we talked about...
Sandro Sana - July 8, 2025
Pig Butchering Scam: How Pig Slaughter Is Becoming an Emotional Addiction Scam Cyber News

Pig Butchering Scam: How Pig Slaughter Is Becoming an Emotional Addiction Scam

In the interconnected labyrinth of the 21st century, where the desire for authenticity and the search for opportunity dance on...
Redazione RHC - July 8, 2025
Human Replatforming! Artificial Intelligence Threatens Half of Jobs Cyber News

Human Replatforming! Artificial Intelligence Threatens Half of Jobs

The chairman of the American car company Ford, Jim Farley, has released a statement sharp on the future of the...
Luca Vinciguerra - July 8, 2025
Pig Butchering Scam: How Pig Slaughter Is Becoming an Emotional Addiction Scam Cyber News

Pig Butchering Scam: How Pig Slaughter Is Becoming an Emotional Addiction Scam

In the interconnected labyrinth of the 21st century, where the desire for authenticity and the search for opportunity dance on...
Daniela Farina - July 7, 2025
After Encrypting Half the World, Hunters International Shuts Down! Decryptor Distributed for Free Cybercrime

After Encrypting Half the World, Hunters International Shuts Down! Decryptor Distributed for Free

Hunters International, the group responsible for one of the largest ransomware attacks in recent years, has officially announced the cessation...
Pietro Melillo - July 4, 2025
DarkForums Takes Over BreachForums’ Telegram Channel “The Jacuzzi” Cyber News

DarkForums Takes Over BreachForums’ Telegram Channel “The Jacuzzi”

The underground landscape of cybercriminal forums continues to evolve and is changing. With an official announcement published on June 25,...
Pietro Melillo - July 4, 2025
Patch Chaos: Windows 11 Update Breaks PDF Printing Cyber News

Patch Chaos: Windows 11 Update Breaks PDF Printing

Yes, once again a Windows update has unleashed hell. The harmless “Microsoft Print to PDF” function, a silent ally of...
Luca Galuppi - July 3, 2025
North Korean Hackers on the Payroll: How Companies Paid Salaries to North Korean IT Specialists Cyber News

North Korean Hackers on the Payroll: How Companies Paid Salaries to North Korean IT Specialists

The US Department of Justice has announced the discovery ofa large-scale scheme in which fake IT specialists from the DPRK...
Redazione RHC - July 2, 2025
HoneyPLC: the new honeypot that revolutionizes the defense of industrial plants Cyber News

HoneyPLC: the new honeypot that revolutionizes the defense of industrial plants

Industrial Control Systems (ICS), critical to the operation of critical infrastructure such as power, water and transportation networks, are increasingly...
Redazione RHC - July 2, 2025

AI stymied by energy constraints, innovative space solutions needed

During an interview on the Manifold podcast, Omar Shams, head of the Google Agents project, emphasized that besides chips, the other major limitation to AI development is energy. It's often...

TapTrap Attack: How to Get Yourself to Click Things Even Your Mom Wouldn’t Approve of

TapTrap exploits user interface animations to bypass Android's permissions system, allowing it to access sensitive data or trick the user into performing destructive actions, such as factory resetting the device....

AI will end the traditional software industry just as the Internet has changed traditional media.

Generative AI, including tools like Cursor and ClaudeCode, are dramatically reducing the cost and time of software development. What once cost hundreds or thousands of dollars per token can now...

Critical Vulnerability in the Linux Kernel: A New Privilege Escalation

A critical double-free vulnerability has been discovered in the pipapo set module of the NFT subsystem of the Linux kernel. An unprivileged attacker can exploit this vulnerability by sending a...

RHC interviews Sector16, one of the most active hacktivist groups of 2025. “Let’s destroy the present for a better future”

In recent months, two disturbing episodes have shaken public opinion and the Italian cybersecurity sector. The first concerned an Italian hospital, violated in its most sensitive heart: videos of patients...

AI Agents: The Intelligent Revolution Explained to Everyone

Imagine a digital assistant who not only answers your questions, but also acts for you, plans strategies, learns from its mistakes, and collaborates with others to solve complex problems. This...

Is the end of state-led cyberspace invasions coming? The 56-page draft prepared by the UN

The eleventh final session of the Open-Ended Working Group (OEWG) on cybersecurity opened at the United Nations Headquarters in New York on July 7. The group was created in 2019...

Claude Shannon: Father of Cryptography and Founder of the Information Age

Whoever has as a mission, to deal with computer security and therefore also with cryptography, must necessarily pass through the figures of two giants of the last century. We are...

Who are the most famous hackers in history?

We often talk about hackers, but who are the famous hackers that ever existed? Considered by many as eccentric geniuses and computer wizards, by others they have the appearance of...

Underwater cables and the “cyber war of the seabed”. Between control, geopolitics and technology

Author: 5ar0m4n Publishing Date: 11/7/2021 We have often addressed the topic of undersea cables on RHC where we talked about the first submarine cable in history and the last one...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE