Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Goodbye PowerShell 2.0 and WMIC! The great Windows 11 cleanup has begun.
Di Redazione RHC - 12/09/2025

Windows 11 users who have installed the September 2025 Update might think that practically nothing changes. At first glance, KB5065426 looks like a normal small patch that Microsoft distributes to eve...

Looking for Volodymyr Tymoshchuk! 11 million dollars for the Nefilim hacker
Di Redazione RHC - 12/09/2025

The U.S. Department of Justice has indicted Ukrainian Volodymyr Tymoshchuk on seven counts of computer hacking and extortion. He is considered one of the most dangerous hackers of recent years. The in...

In Nepal, people are dying for social media! 19 people lost their lives trying to get Facebook back
Di Redazione RHC - 09/09/2025

In a dramatic reversal, Nepal has lifted the nationwide social media blackout imposed last week after it sparked massive youth protests and caused at least 19 deaths, according to local media. The dec...

Xi Jinping and the Chinese APT’s Ambition
Di Alessio Stefan - 08/09/2025

The post-COVID macro political movements, including ongoing conflicts, have prompted a majority of states to shift their medium- to long-term political objectives. Clearly, a paradigm shift has been v...

Salesloft Cyber Attack: Chatbot Drift Temporarily Disabled
Di Redazione RHC - 07/09/2025

Salesloft announced that it would temporarily deactivate its AI-powered chatbot Drift on September 5, after several companies were hit by a massive supply chain attack. The incident resulted in the ma...

Container isolation is at risk. Just 3 lines of code to breach NVIDIA’s AI environments.

Cloud security firm Wiz has identified a critical vulnerability in the NVIDIA Container Toolkit, identified as CVE-2025-23266 and with a CVSS score of...
Redazione RHC - 25/07/2025 - 08:23

What is the Security Operation Center (SOC). The cyber threat control center?

Have you ever heard of the Security Operation Center, or SOC? What exactly is it? Cyber threats are always lurking, ready to exploit any weakness in o...
Redazione RHC - 24/07/2025 - 18:52

What does a CISO do? Meet the Chief Information Security Officer: a beautiful but demanding position.

How many times have we heard this acronym: CISO? But how many of us don't know precisely what it means or have little in-depth knowledge of what a Chi...
Redazione RHC - 24/07/2025 - 18:50

XSS.IS Silenced! Inside the investigation that shut down one of cybercrime’s most feared bazaars.

Imagine opening your favorite forum bookmark, like every evening, to find new stealer variants or yet another batch of newly breached credentials. Ins...
Luca Stivali - 24/07/2025 - 15:09

What is AIOps? How Artificial Intelligence Works for IT Operations

AIOps (Artificial Intelligence for IT Operations) is the application of artificial intelligence - such as machine learning, natural language processin...
Redazione RHC - 24/07/2025 - 11:57

UK Says STOP Ransomware Attacks! Stop Public Administration Ransom Payments

The UK government has announced preparations for a radical measure to combat cybercrime: a ban on paying ransoms after ransomware attacks. The new ban...
Redazione RHC - 24/07/2025 - 08:13
1 72 73 74 75 76 139

Container isolation is at risk. Just 3 lines of code to breach NVIDIA’s AI environments.

- July 25th, 2025

Cloud security firm Wiz has identified a critical vulnerability in the NVIDIA Container Toolkit, identified as CVE-2025-23266 and with a CVSS score of 9.0. The vulnerability, dubbed NVIDIAScape, could pose...

  

What is the Security Operation Center (SOC). The cyber threat control center?

- July 24th, 2025

Have you ever heard of the Security Operation Center, or SOC? What exactly is it? Cyber threats are always lurking, ready to exploit any weakness in organizations' systems and put...

  

What does a CISO do? Meet the Chief Information Security Officer: a beautiful but demanding position.

- July 24th, 2025

How many times have we heard this acronym: CISO? But how many of us don't know precisely what it means or have little in-depth knowledge of what a Chief Information...

  

Banner di sequestro del dominio XSS.IS con loghi BL2C, SBU ed Europol

XSS.IS Silenced! Inside the investigation that shut down one of cybercrime’s most feared bazaars.

- July 24th, 2025

Imagine opening your favorite forum bookmark, like every evening, to find new stealer variants or yet another batch of newly breached credentials. Instead of the usual noticeboard, a banner appears...

  

What is AIOps? How Artificial Intelligence Works for IT Operations

- July 24th, 2025

AIOps (Artificial Intelligence for IT Operations) is the application of artificial intelligence - such as machine learning, natural language processing, and advanced analytics - to automate, simplify, and optimize IT...

  

UK Says STOP Ransomware Attacks! Stop Public Administration Ransom Payments

- July 24th, 2025

The UK government has announced preparations for a radical measure to combat cybercrime: a ban on paying ransoms after ransomware attacks. The new ban applies to public sector organizations and...

  

Sign up for the newsletter