Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Red Hot Cyber Academy

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

What are Botnets? A Journey Through Malware, Cyber Threat Intelligence, and OSINT

The Internet provides a sea of information. We often talk on RHC about Open Source Intelligence (OSINT) and Cyber Threat Intelligence (CTI), i.e. those intelligence disciplines that deal with the rese...


What is a zero-day and the risk of targeted cyber attacks

Zero-day vulnerabilities are one of the greatest cybersecurity risks for organizations. These are unknown and unpatched vulnerabilities that attackers exploit to penetrate computer systems and comprom...


Discovering Scattered Spider: The Criminal Threat Using Advanced Tactics and Techniques

By Cyber Defense Center Maticmind (Andrea Mariucci, Riccardo Michetti, Federico Savastano, Ada Spinelli) The Scattered Spider threat actor, UNC9344, made its appearance in 2022 with two targeted attac...


Tasting the Exploit: HackerHood testa l’exploit su Wing FTP Server del CVE‑2025‑47812 da Score 10

This tool is intended solely for authorized educational and penetration testing purposes. The author assumes no responsibility for any misuse or damage caused by this software. Always ensure you have ...


What is cyber warfare? Between geopolitics, economics, and technology.

Cyber warfare is a form of conflict that takes place at the cyber and digital level. This form of warfare has become increasingly widespread in recent years, thanks to the growing dependence of modern...


Critical Vulnerability in the Linux Kernel: A New Privilege Escalation

A critical double-free vulnerability has been discovered in the pipapo set module of the NFT subsystem of the Linux kernel. An unprivileged attacker can exploit this vulnerability by sending a specially crafted netlink message, triggering a double-free with high stability

Need a Microsoft Windows product key? No problem, ask Chat-GPT.

ChatGPT has once again proven vulnerable to unconventional manipulation: this time it issued valid Windows product keys, including one registered to the major bank Wells Fargo. The vulnerability was discovered during a kind of intellectual provocation: a specialist suggested that

The History of the Linux Kernel (2 of 2). Early Hackers Up to Version 1.0.

- July 13th, 2025

Article by Pietro Cornelio and Massimiliano Brolli Previous articles: The history of the Linux Kernel (1 of 2). From Torvalds to the hacker community In the first article we met...

  

The History of the Linux Kernel (1 of 2). From Torvalds to the Hacker Community

- July 13th, 2025

Article by Pietro Cornelio and Massimiliano Brolli The history of the Linux Kernel is a story of pure hacking as well as being a miracle of "collaboration". It is the...

  

Cult of the Dead Cow (cDc). The story of the most famous hacker group.

- July 13th, 2025

Hacker culture, as we've already discussed, is a fascinating subject that has evolved significantly over time to reach the present day. We talked about its origins in a video dedicated...

  

Apple 2: the story of a great success.

- July 13th, 2025

On June 10, 1977, the Apple II went on sale, the historic microcomputer that kicked off the home computing revolution. We'd like to dedicate an article to its history. The...

  

Sign up for the newsletter