Red Hot Cyber. The Cybersecurity Blog
What is cyber hacktivism? History, motivations, hacking, consequences, and evolution.
The term “hacktivism” is a combination of the English terms “hacking” and “hacktivism” and was coined to describe the use of computer hacking for political or socia...
Disloyal employees. Let’s find out who they are and how to protect ourselves from this growing threat.
In the digital age, cybersecurity is a critical issue for any company handling sensitive data. However, not all risks are external. In fact, employees themselves often pose a threat to an organization...
Bullying and cyberbullying: what it is and how to protect yourself.
News reports are highlighting an ever-increasing number of cases of cyberbullying, some with dramatic outcomes (see incitement to suicide). Cyberbullying is a new form of psychological violence, an in...
What are Botnets? A Journey Through Malware, Cyber Threat Intelligence, and OSINT
The Internet provides a sea of information. We often talk on RHC about Open Source Intelligence (OSINT) and Cyber Threat Intelligence (CTI), i.e. those intelligence disciplines that deal with the rese...
What is a zero-day and the risk of targeted cyber attacks
Zero-day vulnerabilities are one of the greatest cybersecurity risks for organizations. These are unknown and unpatched vulnerabilities that attackers exploit to penetrate computer systems and comprom...
Discovering Scattered Spider: The Criminal Threat Using Advanced Tactics and Techniques
By Cyber Defense Center Maticmind (Andrea Mariucci, Riccardo Michetti, Federico Savastano, Ada Spinelli) The Scattered Spider threat actor, UNC9344, made its appearance in 2022 with two targeted attac...
Tasting the Exploit: HackerHood testa l’exploit su Wing FTP Server del CVE‑2025‑47812 da Score 10
This tool is intended solely for authorized educational and penetration testing purposes. The author assumes no responsibility for any misuse or damage caused by this software. Always ensure you have ...
What is cyber warfare? Between geopolitics, economics, and technology.
Cyber warfare is a form of conflict that takes place at the cyber and digital level. This form of warfare has become increasingly widespread in recent years, thanks to the growing dependence of modern...
Critical Vulnerability in the Linux Kernel: A New Privilege Escalation
A critical double-free vulnerability has been discovered in the pipapo set module of the NFT subsystem of the Linux kernel. An unprivileged attacker can exploit this vulnerability by sending a special...
RHC interviews Sector16, one of the most active hacktivist groups of 2025. “Let’s destroy the present for a better future”
In recent months, two disturbing episodes have shaken public opinion and the Italian cybersecurity sector. The first concerned an Italian hospital, violated in its most sensitive heart: videos of pati...
Featured Articles

The term “hacktivism” is a combination of the English terms “hacking” and “hacktivism” and was coined to describe the use of computer hacking for political or socia...

In the digital age, cybersecurity is a critical issue for any company handling sensitive data. However, not all risks are external. In fact, employees themselves often pose a threat to an organization...

News reports are highlighting an ever-increasing number of cases of cyberbullying, some with dramatic outcomes (see incitement to suicide). Cyberbullying is a new form of psychological violence, an in...

The Internet provides a sea of information. We often talk on RHC about Open Source Intelligence (OSINT) and Cyber Threat Intelligence (CTI), i.e. those intelligence disciplines that deal with the rese...

Zero-day vulnerabilities are one of the greatest cybersecurity risks for organizations. These are unknown and unpatched vulnerabilities that attackers exploit to penetrate computer systems and comprom...

Latvian Government Database Compromised: Over 1.6 Million Government Data Lines!
Pietro Melillo - July 8th, 2024
A malicious actor has claimed to have leaked a database containing over 1.6 million lines of data from the Latvian government. The data breach, dated July 7, 2024, includes all...

Threat Actors Steal 5.90 GB of Sensitive Data from the Fiscalía General del Estado de Veracruz!
Pietro Melillo - July 8th, 2024
In an era where cybersecurity has become crucial for protecting sensitive data, a recent leak has revealed an alleged security breach at the Fiscalía General del Estado de Veracruz. A...

Dangerous 0day Windows LPE Vulnerability for Sale in the Underground
Pietro Melillo - July 7th, 2024
A malicious actor, under the name "tikila", has posted an advertisement on a hacking forum for the sale of a local privilege escalation (LPE) vulnerability for Windows. According to the...

Europol Breached: Secret Documents for Sale on the Dark Web
Pietro Melillo - July 7th, 2024
July 6, 2024: A well-known user of the BreachForums, IntelBroker, has recently announced the sale of a collection of crypto-related documents stolen from Europol's EPE platform. The data breach, which...
Sign up for the newsletter