Red Hot Cyber. The Cybersecurity Blog
BreachForums is back online! 7.3 million posts and 340,000 users restored.
If weeds aren’t pulled out by the roots, they’ll grow back, much more vigorous than before. This is cybercrime, and this is the new rebirth, the fifth ever from the roots of RaidForums! Br...
What is Red Team? A journey into the world of offensive security experts.
The evolution of cyber threats is a constant in today’s world. Malicious individuals, often driven by financial, ideological, or other motivations, seek new ways to overcome organizations’...
UK: Strict rules for online age verification. Pornhub and YouPorn will comply.
Starting Friday, adults in the UK who try to access pornographywill have to prove they are over 18, under some of the strictest regulations in the world. The change means that, instead of having to pr...
Operation Checkmate: A major law enforcement coup. BlackSuit has been apprehended!
During a coordinated international operation dubbed Operation Checkmate, law enforcement officials have dealt a major blow to the BlackSuit ransomware group (onion link here, which has fallen into the...
What does a CISO do? Meet the Chief Information Security Officer: a beautiful but demanding position.
How many times have we heard this acronym: CISO? But how many of us don’t know precisely what it means or have little in-depth knowledge of what a Chief Information Security Officer does? This p...
SharePoint and CrowdStrike: Two Faces of the Same Digital Fragility
In recent days, the global digital landscape has been rocked by a cybersecurity bug that affected on-premise Microsoft SharePoint servers, exposing thousands of organizations to cyber attacks. These a...
ToolShell: Microsoft SharePoint Zero-Day Vulnerability Has Been Under Attack Since Early July
According to cybersecurity experts, several Chinese hacker groups are exploiting a series of zero-day vulnerabilities in Microsoft SharePoint in their attacks. In particular, it emerged that attackers...
Red Hot Cyber Conference 2026. The fifth edition in Rome on Monday, May 18th and Tuesday, May 19th.
The Red Hot Cyber Conference is back! After the great success of the third and fourth editions, the free annual event created by the RHC community is back! An event designed to bring young people clos...
Patriotic Code: From DDoSia and NoName057(16) to CISM, the algorithm that shapes youth for Putin
In February 2025 we had already observed the functioning of DDoSIA, the crowd-hacking system promoted by NoName057(16): a client distributed via Telegram, DDoS attacks against European targets, reward...
Artificial Intelligence: History, Technology, Ethics, Regulations, and the Future
Artificial intelligence (AI) is software that can generate output (i.e., content, predictions, decisions, recommendations) capable of interacting with the environment and according to human objectives...
Featured Articles

If weeds aren’t pulled out by the roots, they’ll grow back, much more vigorous than before. This is cybercrime, and this is the new rebirth, the fifth ever from the roots of RaidForums! Br...

The evolution of cyber threats is a constant in today’s world. Malicious individuals, often driven by financial, ideological, or other motivations, seek new ways to overcome organizations’...

Starting Friday, adults in the UK who try to access pornographywill have to prove they are over 18, under some of the strictest regulations in the world. The change means that, instead of having to pr...

During a coordinated international operation dubbed Operation Checkmate, law enforcement officials have dealt a major blow to the BlackSuit ransomware group (onion link here, which has fallen into the...

How many times have we heard this acronym: CISO? But how many of us don’t know precisely what it means or have little in-depth knowledge of what a Chief Information Security Officer does? This p...

Electronic and robotic warfare: Ukraine is banking on “AD Berserk” to counter enemy drones.
Electronic warfare is taking on an increasingly strategic role in modern warfare, becoming a crucial element in protecting infrastructure, troops, and vehicles from airborne and digital threats. In this context, the Ukrainian company Kvertus has announced the start of serial

Container isolation is at risk. Just 3 lines of code to breach NVIDIA’s AI environments.
Cloud security firm Wiz has identified a critical vulnerability in the NVIDIA Container Toolkit, identified as CVE-2025-23266 and with a CVSS score of 9.0. The vulnerability, dubbed NVIDIAScape, could pose a serious threat to cloud services that use artificial intelligence

What is the Security Operation Center (SOC). The cyber threat control center?
Have you ever heard of the Security Operation Center, or SOC? What exactly is it? Cyber threats are always lurking, ready to exploit any weakness in organizations’ systems and put data, intellectual property, and ICT infrastructure at risk, as well

What does a CISO do? Meet the Chief Information Security Officer: a beautiful but demanding position.
How many times have we heard this acronym: CISO? But how many of us don’t know precisely what it means or have little in-depth knowledge of what a Chief Information Security Officer does? This professional is the guardian of digital

XSS.IS Silenced! Inside the investigation that shut down one of cybercrime’s most feared bazaars.
Imagine opening your favorite forum bookmark, like every evening, to find new stealer variants or yet another batch of newly breached credentials. Instead of the usual noticeboard, a banner appears with three prominent logos: the French Brigade for the Fight

What is AIOps? How Artificial Intelligence Works for IT Operations
AIOps (Artificial Intelligence for IT Operations) is the application of artificial intelligence – such as machine learning, natural language processing, and advanced analytics – to automate, simplify, and optimize IT service management. Born to address the growing complexity of modern

Koske: Linux Malware Developed with Artificial Intelligence
Redazione RHC - July 26th, 2025
AquaSec analysts have discovered a new Linux malware. The malware is called Koske and is believed to have been developed using artificial intelligence. It uses panda JPEG images to inject...

Beyond the Code: When AI Reminds Us Who We Are
Redazione RHC - July 26th, 2025
We are at a crossroads. Not just any crossroads, but an existential one. Artificial Intelligence is no longer science fiction; it is the fog gathering on our path, redefining every...

SharePoint Exploits Are Underway: Businesses and Organizations in the Crosshairs
Redazione RHC - July 26th, 2025
The threat landscape never sleeps, but this time it woke up with a bang. On July 18, 2025, security firm Eye Security issued a warning that immediately resonated throughout the...

UK: Strict rules for online age verification. Pornhub and YouPorn will comply.
Redazione RHC - July 25th, 2025
Starting Friday, adults in the UK who try to access pornographywill have to prove they are over 18, under some of the strictest regulations in the world. The change means...
Sign up for the newsletter