Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Red Hot Cyber Academy

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Tasting the Exploit: HackerHood testa l’exploit su Wing FTP Server del CVE‑2025‑47812 da Score 10

This tool is intended solely for authorized educational and penetration testing purposes. The author assumes no responsibility for any misuse or damage caused by this software. Always ensure you have ...

What is cyber warfare? Between geopolitics, economics, and technology.

Cyber warfare is a form of conflict that takes place at the cyber and digital level. This form of warfare has become increasingly widespread in recent years, thanks to the growing dependence of modern...

Critical Vulnerability in the Linux Kernel: A New Privilege Escalation

A critical double-free vulnerability has been discovered in the pipapo set module of the NFT subsystem of the Linux kernel. An unprivileged attacker can exploit this vulnerability by sending a special...

RHC interviews Sector16, one of the most active hacktivist groups of 2025. “Let’s destroy the present for a better future”

In recent months, two disturbing episodes have shaken public opinion and the Italian cybersecurity sector. The first concerned an Italian hospital, violated in its most sensitive heart: videos of pati...

RCE 0day Exploit for WinRAR and WinZIP for Sale on Exploit.in for Scam Phishing Emails

Recently, the popular underground forum exploit.in, currently closed and accessible by invitation only, has been offering exploits for a 0day vulnerability affecting the well-known WinRAR and WinZIP p...

Dharma/Crysis: Overview and adversary tracking

Author: Emanuele De Lucia Pubblication date: 17/09/2021 This report presents an overview about Dharma/Crysis ransomware. This piece of malware is often observed as late-stage payload in attacks against internet-facing systems, such as RDP. The initial intrusions usually take place via

Avoiding the fis-hack-erman’s hook (aka Detecting a Phishing email)

Author: Antonio PiovesanPubblication Date: 09/08/2021 With the increase of ransomware infections – often instigated through phishing emails, it’s very important/crucial to take proactive measures to help protect yourself and your organization’s security. Of course having computers and servers that are

The Threat Actor 888 claimed a compromise against Microsoft

- July 10th, 2024

On July 9, 2024, a user known as "888" posted on BreachForums claiming to have leaked sensitive data of Microsoft employees. This alleged breach has exposed personal information of 2,073...

  

The Threat Actor 888 claims responsibility for a breach at Nokia.

- July 10th, 2024

A malicious actor, known by the alias "888," recently claimed responsibility for disclosing sensitive data belonging to Nokia. The attack, which occurred in July 2024, compromised a wide range of...

  

Citrix Netscaler ADC and Gateway plagued by serious DOS and Open Redirect flaw

- July 9th, 2024

Two vulnerabilities have been identified in NetScaler ADC and NetScaler Gateway. Affected Versions: The following supported versions of NetScaler ADC and NetScaler Gateway are vulnerable: These devices are widely used...

  

Massive Data Exposure on X (Twitter) Affects 200 Million Users

- July 8th, 2024

Recently, X (Twitter) experienced a massive data exposure, compromising nearly 200 million user records. This incident could be one of the largest user data exposures in recent history, jeopardizing the...

  

Sign up for the newsletter