Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

What are Botnets? A Journey Through Malware, Cyber Threat Intelligence, and OSINT
Di Redazione RHC - 16/07/2025

The Internet provides a sea of information. We often talk on RHC about Open Source Intelligence (OSINT) and Cyber Threat Intelligence (CTI), i.e. those intelligence disciplines that deal with the rese...

What is a zero-day and the risk of targeted cyber attacks
Di Redazione RHC - 16/07/2025

Zero-day vulnerabilities are one of the greatest cybersecurity risks for organizations. These are unknown and unpatched vulnerabilities that attackers exploit to penetrate computer systems and comprom...

Discovering Scattered Spider: The Criminal Threat Using Advanced Tactics and Techniques
Di Redazione RHC - 16/07/2025

By Cyber Defense Center Maticmind (Andrea Mariucci, Riccardo Michetti, Federico Savastano, Ada Spinelli) The Scattered Spider threat actor, UNC9344, made its appearance in 2022 with two targeted attac...

Tasting the Exploit: HackerHood testa l’exploit su Wing FTP Server del CVE‑2025‑47812 da Score 10
Di Redazione RHC - 15/07/2025

This tool is intended solely for authorized educational and penetration testing purposes. The author assumes no responsibility for any misuse or damage caused by this software. Always ensure you have ...

What is cyber warfare? Between geopolitics, economics, and technology.
Di Redazione RHC - 12/07/2025

Cyber warfare is a form of conflict that takes place at the cyber and digital level. This form of warfare has become increasingly widespread in recent years, thanks to the growing dependence of modern...

RHC ransomware Data Room – January 2022

Author: Dott. Luca Mella, Cyber Security Expert (founder doubleextortion.com) Translate: Vincenzo Marcovecchio Pubblication Date: 5/02/2022 In recent years, the ransomware phenomenon has been so disruptive that it heavily influences the security agendas of many companies, organizations, and beyond. The disruptive

Satoshi Nakamoto: let’s discover the mysterious inventor of Bitcoin.

Autore: Brolli Massimiliano Translate: Vincenzo Marcovecchio Pubblication date: 1/06/2021 The true identity of the creator of Bitcoin is one of the greatest mysteries in the tech world. Over the years, many theories have emerged about who Satoshi Nakamoto really is,

Nuclear rearmament, cyber guerrillas and cyber crime.

Author: Roberto Villani Tanslate: Vincenzo Marcovecchio Pubblication date: 19/12/2021 Why will the cyberg wars, indeed the cyber-guerrillas, be more and more present and involve us more and more? The short century, the 1900s that we have left for more than

Why privacy does not exist.

Author Massimiliano Brolli Translation: Vincenzo Marcovecchio Pubblication date: 18/12/2021 Privacy, privacy, privacy, … privacy comes first. How many times have we heard this sentence? Yes, because we talk a lot about this topic, we talk about it at work, we

North Korea’s cyberwarfare and its cyber army (part one)

Author: Olivia Terragni Pubblication date: 13/12/2021 During the night, only one bright spot lights up in North Korea: the city of Pyongyang. Perhaps, due to the dark that surrounds it, we understand so little to comprehend what’s happening there. Maybe

The Hackers Choice – 30 years of hacking without trying to get rich!

- July 16th, 2024

Imagine a time before firewalls and ubiquitous encryption, when the digital frontier was wide open for exploration. Hackers weren't criminals, they were pioneers, fueled by an insatiable thirst for knowledge. ...

  

Rockstar Games Possibly Victim of a Massive Data Leak!

- July 16th, 2024

Recently, an alleged data leak has involved Rockstar Games, one of the world's largest video game producers, famous for titles like Grand Theft Auto and Red Dead Redemption. According to...

  

Potential Data Leak from Google: 1 Million Records Exposed

- July 15th, 2024

Recently, a threat actor claimed to have publicly released one million records scraped from Google, raising significant alarm regarding personal data security. The information appeared on an online forum in...

  

Threat Actor 888 Claims Compromise of BMW (Hong Kong) Customers

- July 15th, 2024

Recently, a concerning news story has emerged in the world of cybersecurity. A well-known hacker, identified by the nickname 888, has allegedly leaked sensitive data belonging to BMW customers in...

  

Sign up for the newsletter