Red Hot Cyber. The Cybersecurity Blog
Tasting the Exploit: HackerHood testa l’exploit su Wing FTP Server del CVE‑2025‑47812 da Score 10
This tool is intended solely for authorized educational and penetration testing purposes. The author assumes no responsibility for any misuse or damage caused by this software. Always ensure you have ...
What is cyber warfare? Between geopolitics, economics, and technology.
Cyber warfare is a form of conflict that takes place at the cyber and digital level. This form of warfare has become increasingly widespread in recent years, thanks to the growing dependence of modern...
Critical Vulnerability in the Linux Kernel: A New Privilege Escalation
A critical double-free vulnerability has been discovered in the pipapo set module of the NFT subsystem of the Linux kernel. An unprivileged attacker can exploit this vulnerability by sending a special...
RHC interviews Sector16, one of the most active hacktivist groups of 2025. “Let’s destroy the present for a better future”
In recent months, two disturbing episodes have shaken public opinion and the Italian cybersecurity sector. The first concerned an Italian hospital, violated in its most sensitive heart: videos of pati...
RCE 0day Exploit for WinRAR and WinZIP for Sale on Exploit.in for Scam Phishing Emails
Recently, the popular underground forum exploit.in, currently closed and accessible by invitation only, has been offering exploits for a 0day vulnerability affecting the well-known WinRAR and WinZIP p...
Featured Articles

This tool is intended solely for authorized educational and penetration testing purposes. The author assumes no responsibility for any misuse or damage caused by this software. Always ensure you have ...

Cyber warfare is a form of conflict that takes place at the cyber and digital level. This form of warfare has become increasingly widespread in recent years, thanks to the growing dependence of modern...

A critical double-free vulnerability has been discovered in the pipapo set module of the NFT subsystem of the Linux kernel. An unprivileged attacker can exploit this vulnerability by sending a special...

In recent months, two disturbing episodes have shaken public opinion and the Italian cybersecurity sector. The first concerned an Italian hospital, violated in its most sensitive heart: videos of pati...

Recently, the popular underground forum exploit.in, currently closed and accessible by invitation only, has been offering exploits for a 0day vulnerability affecting the well-known WinRAR and WinZIP p...

Nuclear rearmament, cyber guerrillas and cyber crime.
Author: Roberto Villani Tanslate: Vincenzo Marcovecchio Pubblication date: 19/12/2021 Why will the cyberg wars, indeed the cyber-guerrillas, be more and more present and involve us more and more? The short century, the 1900s that we have left for more than

Why privacy does not exist.
Author Massimiliano Brolli Translation: Vincenzo Marcovecchio Pubblication date: 18/12/2021 Privacy, privacy, privacy, … privacy comes first. How many times have we heard this sentence? Yes, because we talk a lot about this topic, we talk about it at work, we
Electronic warfare (EW) between the USA, China, South and North Korea (part two)
Author: Olivia TerragniPubblication Date: 13/12/2021 Given that North Korean cyberattacks are not a future threat, but already a FACT, we are already wondering how to deal with the election of the next president of South Korea. To begin the command

North Korea’s cyberwarfare and its cyber army (part one)
Author: Olivia Terragni Pubblication date: 13/12/2021 During the night, only one bright spot lights up in North Korea: the city of Pyongyang. Perhaps, due to the dark that surrounds it, we understand so little to comprehend what’s happening there. Maybe

Making the cyber world a safer and better place: an interview with W1ntermute
Author: Olivia terragni Pubblication Date: 11/11/2021 W1ntermute aka Sofya Ivanov is a woman who works in the cybersecurity industry as a network security analyst and open-source intelligence (OSINT) specialist. This is incredibly challenging. Of course, it’s not that easy in

Ada Lovelace and Charles Babbage, pioneers of programmable computing
Author: Antonio Piovesan Pubblication date: 28/09/2021 Introduction – Age of machines Great Britain, middle decades of the 19th century, times of unprecedented engineering ambitions. Engineering, transportation, communications, architecture, science and manufacturing are in a feverish state of evolution. Inventors and

End of an Era: SiegedSec, the Hacker Group, Announces Its Dissolution
Pietro Melillo - July 11th, 2024
The cybercriminal group SiegedSec, which gained notoriety during Russia's invasion of Ukraine, has recently announced its dissolution. This group, led by "YourAnonWolf," quickly consolidated its power by increasing the number...

Alleged Data Breach of the United States Department of Defense and National Security Agency
Pietro Melillo - July 11th, 2024
Recently, alarming news has emerged on a well-known underground forum regarding alleged data breaches of the United States Department of Defense and the National Security Agency (NSA). The announcements, posted...

New Ransomware Group “Vanir Group”: Three Victims Immediately in Their Data Leak Site
Pietro Melillo - July 10th, 2024
A new ransomware group, calling themselves "Vanir Group," has recently made its debut in the cybercrime landscape. This group has quickly garnered attention for the aggressiveness and professionalism of their...

Meow ransomware claims attack in its Data Leak Site at HPE giant
Pietro Melillo - July 10th, 2024
Introduction Today, the ransomware gang known as Meow has claimed responsibility for a cyberattack on the multinational giant Hewlett Packard Enterprise (HPE). The claim was published on their Data Leak...
Sign up for the newsletter