Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

What are Botnets? A Journey Through Malware, Cyber Threat Intelligence, and OSINT
Di Redazione RHC - 16/07/2025

The Internet provides a sea of information. We often talk on RHC about Open Source Intelligence (OSINT) and Cyber Threat Intelligence (CTI), i.e. those intelligence disciplines that deal with the rese...

What is a zero-day and the risk of targeted cyber attacks
Di Redazione RHC - 16/07/2025

Zero-day vulnerabilities are one of the greatest cybersecurity risks for organizations. These are unknown and unpatched vulnerabilities that attackers exploit to penetrate computer systems and comprom...

Discovering Scattered Spider: The Criminal Threat Using Advanced Tactics and Techniques
Di Redazione RHC - 16/07/2025

By Cyber Defense Center Maticmind (Andrea Mariucci, Riccardo Michetti, Federico Savastano, Ada Spinelli) The Scattered Spider threat actor, UNC9344, made its appearance in 2022 with two targeted attac...

Tasting the Exploit: HackerHood testa l’exploit su Wing FTP Server del CVE‑2025‑47812 da Score 10
Di Redazione RHC - 15/07/2025

This tool is intended solely for authorized educational and penetration testing purposes. The author assumes no responsibility for any misuse or damage caused by this software. Always ensure you have ...

What is cyber warfare? Between geopolitics, economics, and technology.
Di Redazione RHC - 12/07/2025

Cyber warfare is a form of conflict that takes place at the cyber and digital level. This form of warfare has become increasingly widespread in recent years, thanks to the growing dependence of modern...

Threat Actors Steal 5.90 GB of Sensitive Data from the Fiscalía General del Estado de Veracruz!

- July 8th, 2024

In an era where cybersecurity has become crucial for protecting sensitive data, a recent leak has revealed an alleged security breach at the Fiscalía General del Estado de Veracruz. A...

  

Dangerous 0day Windows LPE Vulnerability for Sale in the Underground

- July 7th, 2024

A malicious actor, under the name "tikila", has posted an advertisement on a hacking forum for the sale of a local privilege escalation (LPE) vulnerability for Windows. According to the...

  

Europol Breached: Secret Documents for Sale on the Dark Web

- July 7th, 2024

July 6, 2024: A well-known user of the BreachForums, IntelBroker, has recently announced the sale of a collection of crypto-related documents stolen from Europol's EPE platform. The data breach, which...

  

The New RockYou2024 Collection has been published! 10 Billion Credentials Compromised

- July 6th, 2024

Everyone involved with CTF has used the infamous rockyou.txt wordlist at least once, mainly to perform password cracking activities. The file is a list of 14 million unique passwords originating from the 2009...

  

Sign up for the newsletter