Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Latest news

North Korean Hackers on the Payroll: How Companies Paid Salaries to North Korean IT Specialists Cyber News

North Korean Hackers on the Payroll: How Companies Paid Salaries to North Korean IT Specialists

The US Department of Justice has announced the discovery ofa large-scale scheme in which fake IT specialists from the DPRK...
Redazione RHC - July 2, 2025
HoneyPLC: the new honeypot that revolutionizes the defense of industrial plants Cyber News

HoneyPLC: the new honeypot that revolutionizes the defense of industrial plants

Industrial Control Systems (ICS), critical to the operation of critical infrastructure such as power, water and transportation networks, are increasingly...
Redazione RHC - July 2, 2025
Discovering Predatory Sparrow: Identity, Goals, and Digital Arsenal of the Mysterious Threat Actor Cyber News

Discovering Predatory Sparrow: Identity, Goals, and Digital Arsenal of the Mysterious Threat Actor

On June 17, 2025, a cyber attack paralyzed Bank Sepah, one of Iran's major financial institutions. The attack was claimed...
Sandro Sana - July 1, 2025
Famous hackers: the sad story of Jonathan James, aka c0mrade. Cyber News

Famous hackers: the sad story of Jonathan James, aka c0mrade.

He was born on December 12, 1983, in a small village called Pinecrest located in Miami-Dade County, Florida. His father...
Silvia Felici - July 1, 2025
Famous Hackers: The Story of Gary McKinnon. Cyber News

Famous Hackers: The Story of Gary McKinnon.

A few months after the attacks on the World Trade Center, a strange message appeared on a U.S. Army computer:...
Silvia Felici - July 1, 2025
DuckDuckGo Updates Scam Blocker: Say Goodbye to Online Scams and Fake Sites! Cyber News

DuckDuckGo Updates Scam Blocker: Say Goodbye to Online Scams and Fake Sites!

The Scam Blocker tool built into DuckDuckGo browser has been updated to protect against online scams. Now detects fake e-commerce sites, cryptocurrency...
Redazione RHC - July 1, 2025
Cyberattacks on NFC contactless payments increase, new global threat Cyber News

Cyberattacks on NFC contactless payments increase, new global threat

A new series of cyber attacks has been detected by ESET specialists, which sees the contactless payments sector with NFC...
Redazione RHC - June 30, 2025
The Race to 0day! China Advances in Offensive Cyberpower, While the US Is Forced to Chase Cyber News

The Race to 0day! China Advances in Offensive Cyberpower, While the US Is Forced to Chase

China's growing rise has prompted U.S. officials to strongly emphasize the need to improve its offensive cyber capabilities. However, some...
Agostino Pellegrino - June 30, 2025
Cyberbullying and Digital Terror: Why Betti’s Comic Makes You Feel Uncomfortable (and That’s a Good Thing) Cyber News

Cyberbullying and Digital Terror: Why Betti’s Comic Makes You Feel Uncomfortable (and That’s a Good Thing)

When I decided to write this story of Betti, it was certainly not to make a “nice” or “easy” comic,...
Andrea Gioia Lomoro - June 29, 2025
Miniaturized Military Drone, Mosquito-Sized Model Arrives and China Offers It Cyber News

Miniaturized Military Drone, Mosquito-Sized Model Arrives and China Offers It

In the military sector, the trend to miniaturize drones seems to know no limits, especially when the goal is to...
Redazione RHC - June 29, 2025
Cyber Security: CISA and NSA Recommend Secure Programming Languages Cyber News

Cyber Security: CISA and NSA Recommend Secure Programming Languages

The main US cybersecurity agencies, CISA and NSA, have published a joint document recommending that software developers opt for programming...
Massimiliano Brolli - June 28, 2025
Apple and Google under pressure: German regulator wants to remove DeepSeek Cyber News

Apple and Google under pressure: German regulator wants to remove DeepSeek

Following the Italian data protection regulator, Germany's data protection watchdog has now asked Apple and Alphabet subsidiary Google to remove...
Redazione RHC - June 28, 2025

Who are the most famous hackers in history?

We often talk about hackers, but who are the famous hackers that ever existed? Considered by many as eccentric geniuses and computer wizards, by others they have the appearance of...

Underwater cables and the “cyber war of the seabed”. Between control, geopolitics and technology

Author: 5ar0m4n Publishing Date: 11/7/2021 We have often addressed the topic of undersea cables on RHC where we talked about the first submarine cable in history and the last one...

Pig Butchering Scam: How Pig Slaughter Is Becoming an Emotional Addiction Scam

In the interconnected labyrinth of the 21st century, where the desire for authenticity and the search for opportunity dance on the edge of paradox, a dark phenomenon emerges that challenges...

Human Replatforming! Artificial Intelligence Threatens Half of Jobs

The chairman of the American car company Ford, Jim Farley, has released a statement sharp on the future of the job market in the age of artificial intelligence. According to...

Pig Butchering Scam: How Pig Slaughter Is Becoming an Emotional Addiction Scam

In the interconnected labyrinth of the 21st century, where the desire for authenticity and the search for opportunity dance on the edge of paradox, a dark phenomenon emerges that challenges...

After Encrypting Half the World, Hunters International Shuts Down! Decryptor Distributed for Free

Hunters International, the group responsible for one of the largest ransomware attacks in recent years, has officially announced the cessation of its operations. In a statement published on its darknet...

DarkForums Takes Over BreachForums’ Telegram Channel “The Jacuzzi”

The underground landscape of cybercriminal forums continues to evolve and is changing. With an official announcement published on June 25, 2025 both on Telegram and within the DarkForums forum, the...

Patch Chaos: Windows 11 Update Breaks PDF Printing

Yes, once again a Windows update has unleashed hell. The harmless “Microsoft Print to PDF” function, a silent ally of users and IT administrators for years, has ended up KO...

North Korean Hackers on the Payroll: How Companies Paid Salaries to North Korean IT Specialists

The US Department of Justice has announced the discovery ofa large-scale scheme in which fake IT specialists from the DPRK obtained jobs at American companies by posing as citizens of...

HoneyPLC: the new honeypot that revolutionizes the defense of industrial plants

Industrial Control Systems (ICS), critical to the operation of critical infrastructure such as power, water and transportation networks, are increasingly vulnerable to cyberattacks. In this context, the article HoneyPLC: A...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE