Red Hot Cyber. The Cybersecurity Blog
Malware disguises itself as an innocent photo on Dropbox. APT37’s steganographic strategy
Specialists at the Genians Security Center have discovered an improved version of the RoKRAT malware, associated with the North Korean APT37 group. The new version is distinguished by an unusual way o...
$14.5 billion stolen from LuBian! It’s the largest cryptocurrency theft in history.
In December 2020, the Chinese mining pool LuBian, which at the time occupied nearly 6% of the total Bitcoin network capacity, was the victim of an attack whose full extent has only now been revealed. ...
What are Remote Access Trojans (RATs): The menacing shadow behind spam emails
Remote Access Trojans (RATs), or Remote Access Trojans, are a category of malware. They are designed to allow attackers to remotely control an infected device. This malware is particularly dangerous b...
0-day/0-click RCE exploit for sale on iOS. Explore the cyberweapons market for espionage.
An online forum posting dated July 26, 2025, caught our attention: a user named “Bucad” advertised the sale of an iOS RCE Exploit 0day | ZeroClick/1Click. The exploit, apparently capable...
Microsoft lists 40 jobs that will disappear thanks to AI. “Hands-on” jobs are holding up.
A new Microsoft study offers a surprising (and disturbing) look at how generative AI is reshaping the global workforce. Contrary to popular belief, it’s not just high-tech professionals who are...
WhatsApp in the crosshairs! At Pwn2Own Ireland 2025, a $1 million prize will be awarded for a zero-click RCE exploit.
Trend Micro’s Zero Day Initiative (ZDI) has announced a reward worthy of a zero-day broker! An unprecedented $1,000,000 reward is being offered to anyone who can develop a zero-click remote cod...
Lovense writes to Red Hot Cyber. The CEO provides clarification on security vulnerabilities.
Regarding our previous article about security bugs discovered in Lovesense devices (a leading company in the field of intimacy technology devices), the company has released an official statement to Re...
What is vibe coding? Let’s discover the new frontier of programming.
“I need a system to manage my church events: volunteers, registration, community event planning.”. Two weeks after writing this prompt, John Blackman, a 91-year-old retired electrical en...
AI fever hits Wyoming! A 10-gigawatt data center will consume more electricity than 600,000 people.
The U.S. state of Wyoming, with a population of just under 600,000, could have a data center that consumes more electricity than the state’s entire population. The project, led by energy compan...
VPN usage in the UK increases 1,400% with the UK’s new Online Safety Act.
Across the UK, people are turning to location-blocking virtual private networks (VPNs) to circumvent new national rules on online age verification. Last week, new age verification rules came into forc...
Featured Articles

Specialists at the Genians Security Center have discovered an improved version of the RoKRAT malware, associated with the North Korean APT37 group. The new version is distinguished by an unusual way o...

In December 2020, the Chinese mining pool LuBian, which at the time occupied nearly 6% of the total Bitcoin network capacity, was the victim of an attack whose full extent has only now been revealed. ...

Remote Access Trojans (RATs), or Remote Access Trojans, are a category of malware. They are designed to allow attackers to remotely control an infected device. This malware is particularly dangerous b...

An online forum posting dated July 26, 2025, caught our attention: a user named “Bucad” advertised the sale of an iOS RCE Exploit 0day | ZeroClick/1Click. The exploit, apparently capable...

A new Microsoft study offers a surprising (and disturbing) look at how generative AI is reshaping the global workforce. Contrary to popular belief, it’s not just high-tech professionals who are...

WhiteHouse.gov Data Breach: Threat Actors Leak Sensitive Information!
Redazione RHC - September 21st, 2024
Recently, a threat actor on a dark web forum has posted a claim regarding an alleged data breach involving WhiteHouse.gov. The post, made by a user named "l33tfg," asserts that...

RHC interviews Qilin Ransomware! “Let’s play fair and wait for a worthy opponent on the field”
RHC Dark Lab - September 19th, 2024
Qilin (from Chinese :麒麟) is a legendary creature that appears in Chinese mythology and is said to appear with the imminent arrival or demise of a sage or illustrious ruler....

Navigating the future: a dialogue on human resilience and preservation
Alessandro Rugolo - September 5th, 2024
Participants: NewPlato: A contemporary philosopher seeking to understand the nature of human civilization and its future. NewSocrates: A wise mentor exploring the implications of population growth, technological advancements, and the...

Cryptography at Risk: MIT develops a Quantum Algorithm to crack RSA.
Tara Lie - August 27th, 2024
Modern encryption methods, such as RSA, are based on the fact that even the most powerful classical computers are not able to quickly decompose a large number into prime factors....
Sign up for the newsletter