Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

In Nepal, people are dying for social media! 19 people lost their lives trying to get Facebook back
Di Redazione RHC - 09/09/2025

In a dramatic reversal, Nepal has lifted the nationwide social media blackout imposed last week after it sparked massive youth protests and caused at least 19 deaths, according to local media. The dec...

Xi Jinping and the Chinese APT’s Ambition
Di Alessio Stefan - 08/09/2025

The post-COVID macro political movements, including ongoing conflicts, have prompted a majority of states to shift their medium- to long-term political objectives. Clearly, a paradigm shift has been v...

Salesloft Cyber Attack: Chatbot Drift Temporarily Disabled
Di Redazione RHC - 07/09/2025

Salesloft announced that it would temporarily deactivate its AI-powered chatbot Drift on September 5, after several companies were hit by a massive supply chain attack. The incident resulted in the ma...

Discover the Dark Web: Access, Secrets, and Helpful Links to the Onion Network
Di Redazione RHC - 06/09/2025

The Dark Web is a part of the internet that cannot be reached with standard browsers (Chrome, Firefox, Edge). To access it, you need to use specific tools like the Tor Browser, which guarantees anonym...

AI A2 detected 102 0-day bugs and created exploits in Android apps for $1.77
Di Redazione RHC - 06/09/2025

Artificial intelligence systems have been criticized for creating confusing vulnerability reports and inundating open-source developers with irrelevant complaints. But researchers at Nanjing Universit...

RHC interviews Sector16, one of the most active hacktivist groups of 2025. “Let’s destroy the present for a better future”

In recent months, two disturbing episodes have shaken public opinion and the Italian cybersecurity sector. The first concerned an Italian hospital, vi...
RHC Dark Lab - 11/07/2025 - 07:36

Need a Microsoft Windows product key? No problem, ask Chat-GPT.

ChatGPT has once again proven vulnerable to unconventional manipulation: this time it issued valid Windows product keys, including one registered to t...
Redazione RHC - 10/07/2025 - 20:33

What is Cyber Security? Threats, Cybercrime, Protection, and Work

Cybersecurity has become one of the most important issues in the digital age we live in. With the increase in the number of connected devices, the wid...
Redazione RHC - 10/07/2025 - 08:31

Attacks on Artificial Intelligence: Adversarial Attacks and Data Poisoning.

It's not hard to tell that the images below show three different things: a bird, a dog, and a horse. But to a machine learning algorithm, all three mi...
Redazione RHC - 10/07/2025 - 08:29

AI Agents: The Intelligent Revolution Explained to Everyone

Imagine a digital assistant who not only answers your questions, but also acts for you, plans strategies, learns from its mistakes, and collaborates w...
Redazione RHC - 10/07/2025 - 08:09

RCE 0day Exploit for WinRAR and WinZIP for Sale on Exploit.in for Scam Phishing Emails

Recently, the popular underground forum exploit.in, currently closed and accessible by invitation only, has been offering exploits for a 0day vulnerab...
Redazione RHC - 10/07/2025 - 07:48
1 88 89 90 91 92 137

RHC interviews Sector16, one of the most active hacktivist groups of 2025. “Let’s destroy the present for a better future”

- July 11th, 2025

In recent months, two disturbing episodes have shaken public opinion and the Italian cybersecurity sector. The first concerned an Italian hospital, violated in its most sensitive heart: videos of patients...

  

Need a Microsoft Windows product key? No problem, ask Chat-GPT.

- July 10th, 2025

ChatGPT has once again proven vulnerable to unconventional manipulation: this time it issued valid Windows product keys, including one registered to the major bank Wells Fargo. The vulnerability was discovered...

  

What is Cyber Security? Threats, Cybercrime, Protection, and Work

- July 10th, 2025

Cybersecurity has become one of the most important issues in the digital age we live in. With the increase in the number of connected devices, the widespread use of the...

  

Attacks on Artificial Intelligence: Adversarial Attacks and Data Poisoning.

- July 10th, 2025

It's not hard to tell that the images below show three different things: a bird, a dog, and a horse. But to a machine learning algorithm, all three might look...

  

AI Agents: The Intelligent Revolution Explained to Everyone

- July 10th, 2025

Imagine a digital assistant who not only answers your questions, but also acts for you, plans strategies, learns from its mistakes, and collaborates with others to solve complex problems. This...

  

RCE 0day Exploit for WinRAR and WinZIP for Sale on Exploit.in for Scam Phishing Emails

- July 10th, 2025

Recently, the popular underground forum exploit.in, currently closed and accessible by invitation only, has been offering exploits for a 0day vulnerability affecting the well-known WinRAR and WinZIP programs. The ad,...

  

Sign up for the newsletter