Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Malware disguises itself as an innocent photo on Dropbox. APT37’s steganographic strategy
Di Redazione RHC - 04/08/2025

Specialists at the Genians Security Center have discovered an improved version of the RoKRAT malware, associated with the North Korean APT37 group. The new version is distinguished by an unusual way o...

$14.5 billion stolen from LuBian! It’s the largest cryptocurrency theft in history.
Di Redazione RHC - 04/08/2025

In December 2020, the Chinese mining pool LuBian, which at the time occupied nearly 6% of the total Bitcoin network capacity, was the victim of an attack whose full extent has only now been revealed. ...

What are Remote Access Trojans (RATs): The menacing shadow behind spam emails
Di Redazione RHC - 03/08/2025

Remote Access Trojans (RATs), or Remote Access Trojans, are a category of malware. They are designed to allow attackers to remotely control an infected device. This malware is particularly dangerous b...

0-day/0-click RCE exploit for sale on iOS. Explore the cyberweapons market for espionage.
Di Redazione RHC - 01/08/2025

An online forum posting dated July 26, 2025, caught our attention: a user named “Bucad” advertised the sale of an iOS RCE Exploit 0day | ZeroClick/1Click. The exploit, apparently capable...

Microsoft lists 40 jobs that will disappear thanks to AI. “Hands-on” jobs are holding up.
Di Redazione RHC - 01/08/2025

A new Microsoft study offers a surprising (and disturbing) look at how generative AI is reshaping the global workforce. Contrary to popular belief, it’s not just high-tech professionals who are...

WhiteHouse.gov Data Breach: Threat Actors Leak Sensitive Information!

- September 21st, 2024

Recently, a threat actor on a dark web forum has posted a claim regarding an alleged data breach involving WhiteHouse.gov. The post, made by a user named "l33tfg," asserts that...

  

RHC interviews Qilin Ransomware! “Let’s play fair and wait for a worthy opponent on the field”

- September 19th, 2024

Qilin (from Chinese :麒麟) is a legendary creature that appears in Chinese mythology and is said to appear with the imminent arrival or demise of a sage or illustrious ruler....

  

Navigating the future: a dialogue on human resilience and preservation

- September 5th, 2024

Participants: NewPlato: A contemporary philosopher seeking to understand the nature of human civilization and its future. NewSocrates: A wise mentor exploring the implications of population growth, technological advancements, and the...

  

Cryptography at Risk: MIT develops a Quantum Algorithm to crack RSA.

- August 27th, 2024

Modern encryption methods, such as RSA, are based on the fact that even the most powerful classical computers are not able to quickly decompose a large number into prime factors....

  

Sign up for the newsletter