Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Enterprise BusinessLog 320x200 1
Banner Ancharia Desktop 1 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Intel releases urgent patches for new Spectre variant
Di Redazione RHC - 19/10/2025

VUSec researchers have presented a paper titled “Training Solo,” which challenges the fundamental principles of protection against Spectre-v2 attacks. Previously , the domain isolation mec...

Immagine del sito
Famous hackers: Vladimir Levin and the first online bank robbery.
Di Redazione RHC - 18/10/2025

Today we’ll meet another hacker from the past. He’s Vladimir Levin, a Russian hacker from St. Petersburg (Владимир Леонидович Левин), who became famous for breaking ...

Immagine del sito
Cyber Attack on European Airports: Everest Ransomware Claims Claim
Di Redazione RHC - 18/10/2025

On September 20, we reported on a cyberattack that paralyzed several European airports, including Brussels, Berlin, and London Heathrow. This was a supply chain attack that exploited the compromise of...

Immagine del sito
Inmates hack prison: sentences reduced, funds transferred, and unauthorized visits
Di Redazione RHC - 18/10/2025

The Romanian penitentiary system has found itself at the center of a major digital scandal: inmates in Târgu Jiu hacked the PNA’s internal platform and, for several months, managed data on pris...

Immagine del sito
WiFi: From Marconi’s Origins to the Wireless Network We Know Today
Di RedWave Team - 18/10/2025

Today, we live in a world where WiFi is a fundamental necessity, but how did this technology, now taken for granted, come about? How did it then develop into the network we now use every day? In this ...

Cyberdrones, radar evasion, and autonomous swarms: Rome, the invisible challenge of Jubilee 2025

Jubilee 2025 in Rome presents a challenge not only for managing millions of pilgrims and tourists, but also for protecting urban airspace. Drones, inc...
Francesco Demarcus - 17/10/2025 - 11:16

It all started with LinkedIn and a work contact: developers lured, crypto wallets emptied

A North Korean group linked to the DPRK has developed EtherHiding , a method for hiding malicious code within public blockchain smart contracts and mo...
Redazione RHC - 17/10/2025 - 11:07

Nvidia, Microsoft, and xAI join forces to acquire Aligned Data Centers for $40 billion

A consortium of Nvidia, Microsoft, BlackRock and xAI , the company founded by Elon Musk , announced on Wednesday an agreement to acquire Aligned Data ...
Redazione RHC - 17/10/2025 - 10:33

From online fraud to organ trafficking. South Korea repatriates citizens from Cambodia.

South Korea has launched a repatriation operation for its citizens from Cambodia, following reports of kidnappings, violence and the death of a 22-yea...
Redazione RHC - 17/10/2025 - 08:26

Bus becomes travelling museum of retro computers in UK

In the UK, father and son Jason and Luke Stoner have transformed an old school bus into a traveling museum dedicated to retro computers and game conso...
Redazione RHC - 16/10/2025 - 19:06

A computer science degree is no longer a guarantee of employment. AI is stealing jobs (and interviews).

Once upon a time, a degree in computer science was a guarantee of success. Competitive salaries, generous benefits, and immediate employment opportuni...
Redazione RHC - 16/10/2025 - 18:26
1 5 6 7 8 9 197

Cyberdrones, radar evasion, and autonomous swarms: Rome, the invisible challenge of Jubilee 2025

- October 17th, 2025

Jubilee 2025 in Rome presents a challenge not only for managing millions of pilgrims and tourists, but also for protecting urban airspace. Drones, increasingly widespread and accessible, bring with them...

Facebook Linkedin X

It all started with LinkedIn and a work contact: developers lured, crypto wallets emptied

- October 17th, 2025

A North Korean group linked to the DPRK has developed EtherHiding , a method for hiding malicious code within public blockchain smart contracts and modifying payloads on the fly. According...

Facebook Linkedin X

Nvidia, Microsoft, and xAI join forces to acquire Aligned Data Centers for $40 billion

- October 17th, 2025

A consortium of Nvidia, Microsoft, BlackRock and xAI , the company founded by Elon Musk , announced on Wednesday an agreement to acquire Aligned Data Centers for a total value...

Facebook Linkedin X

From online fraud to organ trafficking. South Korea repatriates citizens from Cambodia.

- October 17th, 2025

South Korea has launched a repatriation operation for its citizens from Cambodia, following reports of kidnappings, violence and the death of a 22-year-old student who was the victim of a...

Facebook Linkedin X

Bus becomes travelling museum of retro computers in UK

- October 16th, 2025

In the UK, father and son Jason and Luke Stoner have transformed an old school bus into a traveling museum dedicated to retro computers and game consoles. The inspiration came...

Facebook Linkedin X

A computer science degree is no longer a guarantee of employment. AI is stealing jobs (and interviews).

- October 16th, 2025

Once upon a time, a degree in computer science was a guarantee of success. Competitive salaries, generous benefits, and immediate employment opportunities were the norm. Today, however, for many young...

Facebook Linkedin X
Most Read Articles of the Month Most Read Articles of the Week
  1. The Truth About Windows XP License Key: FCKGW-RHQQ2-YXRKT-8TG6W-2B7Q8
  2. Computer science graduates with no future! Thousands of resumes ignored, and goodbye to six-figure salaries.
  3. With 50 dollars and physical access to the server, the Cloud goes to hell
  4. Shocking collapse: -71% of job offers for software engineers in three years
  5. Hackers hit the United States: critical federal infrastructure compromised
  1. WhatsApp Web in the crosshairs! How the worm that distributes the banking Trojan works
  2. “Double Bind” Leads to GPT-5 Jailbreak: The AI That Was Convinced It Was Schizophrenic
  3. F5 Suffers Security Breach: Source Code and Sensitive Data Stolen
  4. DAS: The world’s ear hidden in submarine cables
  5. Electricians and plumbers: They are the real winners of the AI boom

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE