Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

LECS 970x120 1
Precedente Successivo

Latest news

Is your VPN protecting you or spying on you? 800 free VPNs analyzed with disturbing results. Cyber News

Is your VPN protecting you or spying on you? 800 free VPNs analyzed with disturbing results.

Millions of people use mobile VPNs to hide their traffic, bypass blocks, and browse the web securely. Research by Zimperium...
Redazione RHC - October 9, 2025
Qualcomm Acquires Arduino to Strengthen Presence in IoT and Robotics Cyber News

Qualcomm Acquires Arduino to Strengthen Presence in IoT and Robotics

Qualcomm announced on Tuesday the acquisition of Arduino , an Italian company known for producing low-cost programmable printed circuit boards....
Silvia Felici - October 8, 2025
North Korean hackers steal $2 billion in cryptocurrency in nine months of fraud Cyber News

North Korean hackers steal $2 billion in cryptocurrency in nine months of fraud

A North Korean-linked hacking network stole over $2 billion in cryptocurrency in the first nine months of 2025. Elliptic analysts...
Redazione RHC - October 8, 2025
Scattered Lapsus$ Hunters: “We’re paying those who bombard corporate executives with emails.” Cyber News

Scattered Lapsus$ Hunters: “We’re paying those who bombard corporate executives with emails.”

Renewing their strategy, the Scattered Lapsus$ Hunters group has returned to the forefront with a new and surprising tactic to...
Pietro Melillo - October 8, 2025
Redox OS introduces multithreading by default and improves performance. Cyber News

Redox OS introduces multithreading by default and improves performance.

The developers of the Redox OS operating system, written in Rust, have enabled multithreading support by default for x86 systems....
Redazione RHC - October 8, 2025
Feed Wars: Pro-Israel PsyOps Land on TikTok and ChatGPT Cyber News

Feed Wars: Pro-Israel PsyOps Land on TikTok and ChatGPT

The Israeli government has awarded the American company Clock Tower X LLC a $6 million contract to conduct a large-scale...
Luca Vinciguerra - October 8, 2025

What is the Security Operation Center (SOC). The cyber threat control center?

Have you ever heard of the Security Operation Center, or SOC? What exactly is it? Cyber threats are always lurking, ready to exploit any weakness in organizations' systems and put...

What does a CISO do? Meet the Chief Information Security Officer: a beautiful but demanding position.

How many times have we heard this acronym: CISO? But how many of us don't know precisely what it means or have little in-depth knowledge of what a Chief Information...
Banner di sequestro del dominio XSS.IS con loghi BL2C, SBU ed Europol

XSS.IS Silenced! Inside the investigation that shut down one of cybercrime’s most feared bazaars.

Imagine opening your favorite forum bookmark, like every evening, to find new stealer variants or yet another batch of newly breached credentials. Instead of the usual noticeboard, a banner appears...

What is AIOps? How Artificial Intelligence Works for IT Operations

AIOps (Artificial Intelligence for IT Operations) is the application of artificial intelligence - such as machine learning, natural language processing, and advanced analytics - to automate, simplify, and optimize IT...

SharePoint and CrowdStrike: Two Faces of the Same Digital Fragility

In recent days, the global digital landscape has been rocked by a cybersecurity bug that affected on-premise Microsoft SharePoint servers, exposing thousands of organizations to cyber attacks. These are not...

Red Hot Cyber Conference 2026. The fifth edition in Rome on Monday, May 18th and Tuesday, May 19th.

The Red Hot Cyber Conference is back! After the great success of the third and fourth editions, the free annual event created by the RHC community is back! An event...

Patriotic Code: From DDoSia and NoName057(16) to CISM, the algorithm that shapes youth for Putin

In February 2025 we had already observed the functioning of DDoSIA, the crowd-hacking system promoted by NoName057(16): a client distributed via Telegram, DDoS attacks against European targets, rewards in cryptocurrencies.A...

Discovering IaB JohnDoe7: Access for sale from the common man

We continue our series of articles on Initial Access Brokers with an article on JohnDoe7 (also known as LORD1), who, as we'll see later, uses a name/moniker reminiscent of movies...

Cyberattacks skyrocket in Europe! Every three minutes, a company is hit.

With the rapid growth of digital threats, businesses around the world are under cyberattack. According to the latest data from Check Point Research, each organization experiences an average of 1,984...

What are penetration tests, why are they done, who performs them, and the benefits for organizations.

Penetration testing is an increasingly widespread practice in the field of cybersecurity. It is a real simulation of a cyber attack, conducted by a team of security experts, in order...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE