Red Hot Cyber. The Cybersecurity Blog
0-day/0-click RCE exploit for sale on iOS. Explore the cyberweapons market for espionage.
An online forum posting dated July 26, 2025, caught our attention: a user named “Bucad” advertised the sale of an iOS RCE Exploit 0day | ZeroClick/1Click. The exploit, apparently capable o...
Microsoft lists 40 jobs that will disappear thanks to AI. “Hands-on” jobs are holding up.
A new Microsoft study offers a surprising (and disturbing) look at how generative AI is reshaping the global workforce. Contrary to popular belief, it’s not just high-tech professionals who are ...
WhatsApp in the crosshairs! At Pwn2Own Ireland 2025, a $1 million prize will be awarded for a zero-click RCE exploit.
Trend Micro’s Zero Day Initiative (ZDI) has announced a reward worthy of a zero-day broker! An unprecedented $1,000,000 reward is being offered to anyone who can develop a zero-click remote code...
Lovense writes to Red Hot Cyber. The CEO provides clarification on security vulnerabilities.
Regarding our previous article about security bugs discovered in Lovesense devices (a leading company in the field of intimacy technology devices), the company has released an official statement to Re...
What is vibe coding? Let’s discover the new frontier of programming.
“I need a system to manage my church events: volunteers, registration, community event planning.”. Two weeks after writing this prompt, John Blackman, a 91-year-old retired electrical engi...
AI fever hits Wyoming! A 10-gigawatt data center will consume more electricity than 600,000 people.
The U.S. state of Wyoming, with a population of just under 600,000, could have a data center that consumes more electricity than the state’s entire population. The project, led by energy company...
VPN usage in the UK increases 1,400% with the UK’s new Online Safety Act.
Across the UK, people are turning to location-blocking virtual private networks (VPNs) to circumvent new national rules on online age verification. Last week, new age verification rules came into forc...
What is a Bug Bounty and what is a responsible disclosure program?
In recent years, concerns about cybersecurity have grown exponentially. The increase in cyber attacks, the advancement of hacking techniques, and the ever-increasing importance of personal data have l...
7,000 servers wiped out! Silent Crow and Cyberpartisans BY devastate Aeroflot in a historic cyber raid.
While the West battles ransomware attacks and private companies invest in defensive security, on the other side of the digital front, the war is being played out asymmetrically. On July 28, 2025, Russ...
Target: Your Voice! Scattered Spider targets VMware ESXi by cloning employee voices.
The Scattered Spider group has intensified its attacks on corporate IT environments, targeting the VMware ESXi hypervisors of US companies in the retail, transportation, and insurance sectors. These a...
Featured Articles

An online forum posting dated July 26, 2025, caught our attention: a user named “Bucad” advertised the sale of an iOS RCE Exploit 0day | ZeroClick/1Click. The exploit, apparently capable o...

A new Microsoft study offers a surprising (and disturbing) look at how generative AI is reshaping the global workforce. Contrary to popular belief, it’s not just high-tech professionals who are ...

Trend Micro’s Zero Day Initiative (ZDI) has announced a reward worthy of a zero-day broker! An unprecedented $1,000,000 reward is being offered to anyone who can develop a zero-click remote code...

Regarding our previous article about security bugs discovered in Lovesense devices (a leading company in the field of intimacy technology devices), the company has released an official statement to Re...

“I need a system to manage my church events: volunteers, registration, community event planning.”. Two weeks after writing this prompt, John Blackman, a 91-year-old retired electrical engi...

Donald Trump’s campaign under attack! Documents and internal communications exfiltrated
Alessio Stefan - August 11th, 2024
After the European elections unfolded, geopolitical attentions shifted to the U.S. election campaign, one of the most dynamic in recent years recently with the Democrats' recent changeover with Harris as...

RipperSec claims DDoS attack on Ferrari
Inva Malaj - August 11th, 2024
Recently the Hacktivist Group "RipperSec" claimed to have attacked Ferrari's global site in the name of justice for Palestine. The hacktivist group known as 'RipperSec' claimed responsibility for a DDoS...

NSO Group targeted! BlackMeta attacks Spyware maker’s central domain
Alessio Stefan - August 4th, 2024
The Pro-Palestinian group BlackMeta (or DarkMeta) announced on August 1, 2024, on their official telegram channel that they conducted a destructive attack on the NSO group's infrastructure, including the central...

Echelon Stealer: The Open Source Malware
Pietro Melillo - July 31st, 2024
Echelon Stealer is an infostealer malware that was first discovered in 2018 and is still active. Currently shared as an open-source tool on GitHub, Echelon Stealer offers various advanced features...
Sign up for the newsletter