Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Red Hot Cyber Academy

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

In Nepal, people are dying for social media! 19 people lost their lives trying to get Facebook back
Di Redazione RHC - 09/09/2025

In a dramatic reversal, Nepal has lifted the nationwide social media blackout imposed last week after it sparked massive youth protests and caused at least 19 deaths, according to local media. The dec...

Xi Jinping and the Chinese APT’s Ambition
Di Alessio Stefan - 08/09/2025

The post-COVID macro political movements, including ongoing conflicts, have prompted a majority of states to shift their medium- to long-term political objectives. Clearly, a paradigm shift has been v...

Salesloft Cyber Attack: Chatbot Drift Temporarily Disabled
Di Redazione RHC - 07/09/2025

Salesloft announced that it would temporarily deactivate its AI-powered chatbot Drift on September 5, after several companies were hit by a massive supply chain attack. The incident resulted in the ma...

Discover the Dark Web: Access, Secrets, and Helpful Links to the Onion Network
Di Redazione RHC - 06/09/2025

The Dark Web is a part of the internet that cannot be reached with standard browsers (Chrome, Firefox, Edge). To access it, you need to use specific tools like the Tor Browser, which guarantees anonym...

AI A2 detected 102 0-day bugs and created exploits in Android apps for $1.77
Di Redazione RHC - 06/09/2025

Artificial intelligence systems have been criticized for creating confusing vulnerability reports and inundating open-source developers with irrelevant complaints. But researchers at Nanjing Universit...

What is phishing? Let’s avoid falling for the hack-fisherman’s bait.

With the increase in ransomware attacks—often launched via phishing emails—it's crucial to be proactive in protecting yourself and the organization yo...
Redazione RHC - 14/07/2025 - 07:29

What are supply chain attacks? A more concrete threat than ever.

As businesses become increasingly dependent on technology, connectivity, and third parties in general, supply chain attacks are becoming increasingly ...
Redazione RHC - 14/07/2025 - 07:26

I use macOS because it’s secure! Atomic Stealer: €1,000 per month with backdoor features

Researchers have discovered a new version of the Atomic Stealer malware for macOS (also known as AMOS). The malware now has a backdoor that allows acc...
Redazione RHC - 14/07/2025 - 07:02

Commodore 64: The return of the best-selling retro computer of all time is now

The record for best-selling desktop computer of all time is still held by the Commodore 64, as certified by the Guinness Book of Records, despite its ...
Redazione RHC - 13/07/2025 - 16:25

The History of the Linux Kernel (2 of 2). Early Hackers Up to Version 1.0.

Article by Pietro Cornelio and Massimiliano Brolli Previous articles: The history of the Linux Kernel (1 of 2). From Torvalds to the hacker community ...
Redazione RHC - 13/07/2025 - 12:25

The History of the Linux Kernel (1 of 2). From Torvalds to the Hacker Community

Article by Pietro Cornelio and Massimiliano Brolli The history of the Linux Kernel is a story of pure hacking as well as being a miracle of "collab...
Redazione RHC - 13/07/2025 - 12:19
1 85 86 87 88 89 137

What is phishing? Let’s avoid falling for the hack-fisherman’s bait.

- July 14th, 2025

With the increase in ransomware attacks—often launched via phishing emails—it's crucial to be proactive in protecting yourself and the organization you work for. Certainly, having computers and servers that are...

  

What are supply chain attacks? A more concrete threat than ever.

- July 14th, 2025

As businesses become increasingly dependent on technology, connectivity, and third parties in general, supply chain attacks are becoming increasingly common. These attacks are aimed at compromising companies through their suppliers...

  

I use macOS because it’s secure! Atomic Stealer: €1,000 per month with backdoor features

- July 14th, 2025

Researchers have discovered a new version of the Atomic Stealer malware for macOS (also known as AMOS). The malware now has a backdoor that allows access to hacked systems. MacPaw...

  

Commodore 64: The return of the best-selling retro computer of all time is now

- July 13th, 2025

The record for best-selling desktop computer of all time is still held by the Commodore 64, as certified by the Guinness Book of Records, despite its discontinuation in 1994. However,...

  

The History of the Linux Kernel (2 of 2). Early Hackers Up to Version 1.0.

- July 13th, 2025

Article by Pietro Cornelio and Massimiliano Brolli Previous articles: The history of the Linux Kernel (1 of 2). From Torvalds to the hacker community In the first article we met...

  

The History of the Linux Kernel (1 of 2). From Torvalds to the Hacker Community

- July 13th, 2025

Article by Pietro Cornelio and Massimiliano Brolli The history of the Linux Kernel is a story of pure hacking as well as being a miracle of "collaboration". It is the...

  

Sign up for the newsletter