Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

In Nepal, people are dying for social media! 19 people lost their lives trying to get Facebook back
Di Redazione RHC - 09/09/2025

In a dramatic reversal, Nepal has lifted the nationwide social media blackout imposed last week after it sparked massive youth protests and caused at least 19 deaths, according to local media. The dec...

Xi Jinping and the Chinese APT’s Ambition
Di Alessio Stefan - 08/09/2025

The post-COVID macro political movements, including ongoing conflicts, have prompted a majority of states to shift their medium- to long-term political objectives. Clearly, a paradigm shift has been v...

Salesloft Cyber Attack: Chatbot Drift Temporarily Disabled
Di Redazione RHC - 07/09/2025

Salesloft announced that it would temporarily deactivate its AI-powered chatbot Drift on September 5, after several companies were hit by a massive supply chain attack. The incident resulted in the ma...

Discover the Dark Web: Access, Secrets, and Helpful Links to the Onion Network
Di Redazione RHC - 06/09/2025

The Dark Web is a part of the internet that cannot be reached with standard browsers (Chrome, Firefox, Edge). To access it, you need to use specific tools like the Tor Browser, which guarantees anonym...

AI A2 detected 102 0-day bugs and created exploits in Android apps for $1.77
Di Redazione RHC - 06/09/2025

Artificial intelligence systems have been criticized for creating confusing vulnerability reports and inundating open-source developers with irrelevant complaints. But researchers at Nanjing Universit...

Pig Butchering Scam: How Pig Slaughter Is Becoming an Emotional Addiction Scam

In the interconnected labyrinth of the 21st century, where the desire for authenticity and the search for opportunity dance on the edge of paradox, a ...
Redazione RHC - 08/07/2025 - 09:17

A new Poc Exploit allows Privilege Excalation on Linux using the udisksd daemon

A proof-of-concept (PoC) exploit for a critical vulnerability that allows local privilege escalation has been developed, affecting several major Linux...
Redazione RHC - 08/07/2025 - 09:16

Critical Vulnerabilities in SMBClient for macOS. 9.8 out of 10 for Effective RCE

Experts have identified serious vulnerabilities in SMBClient for macOS that affect both user space and the operating system kernel. These vulnerabilit...
Redazione RHC - 08/07/2025 - 09:15

Discovering Drumrlu. The IaB that does big business between Türkiye and Venezuela

After the Far East and Iran, we continue our series of articles on IAB actors with an actor believed to be based in Europe, in a NATO country. Orig...
Redazione RHC - 08/07/2025 - 09:12

Human Replatforming! Artificial Intelligence Threatens Half of Jobs

The chairman of the American car company Ford, Jim Farley, has released a statement sharp on the future of the job market in the age of artificial int...
Redazione RHC - 08/07/2025 - 09:11

123 Stealer is coming! $120 a month subscription to steal any confidential data

A new infostealer emerges from the criminal underground and its name is "123 | Stealer". The author of this software is a hacker who hides under the p...
Redazione RHC - 07/07/2025 - 07:53
1 90 91 92 93 94 137

Pig Butchering Scam: How Pig Slaughter Is Becoming an Emotional Addiction Scam

- July 8th, 2025

In the interconnected labyrinth of the 21st century, where the desire for authenticity and the search for opportunity dance on the edge of paradox, a dark phenomenon emerges that challenges...

  

A new Poc Exploit allows Privilege Excalation on Linux using the udisksd daemon

- July 8th, 2025

A proof-of-concept (PoC) exploit for a critical vulnerability that allows local privilege escalation has been developed, affecting several major Linux distributions, such as Fedora and SUSE. The vulnerability, tracked as...

  

Critical Vulnerabilities in SMBClient for macOS. 9.8 out of 10 for Effective RCE

- July 8th, 2025

Experts have identified serious vulnerabilities in SMBClient for macOS that affect both user space and the operating system kernel. These vulnerabilities potentially allow remote execution of arbitrary code and disruption...

  

Discovering Drumrlu. The IaB that does big business between Türkiye and Venezuela

- July 8th, 2025

After the Far East and Iran, we continue our series of articles on IAB actors with an actor believed to be based in Europe, in a NATO country. Origin and...

  

Human Replatforming! Artificial Intelligence Threatens Half of Jobs

- July 8th, 2025

The chairman of the American car company Ford, Jim Farley, has released a statement sharp on the future of the job market in the age of artificial intelligence. According to...

  

123 Stealer is coming! $120 a month subscription to steal any confidential data

- July 7th, 2025

A new infostealer emerges from the criminal underground and its name is "123 | Stealer". The author of this software is a hacker who hides under the pseudonym koneko. He...

  

Sign up for the newsletter