Red Hot Cyber. The Cybersecurity Blog
What are Botnets? A Journey Through Malware, Cyber Threat Intelligence, and OSINT
The Internet provides a sea of information. We often talk on RHC about Open Source Intelligence (OSINT) and Cyber Threat Intelligence (CTI), i.e. those intelligence disciplines that deal with the rese...
What is a zero-day and the risk of targeted cyber attacks
Zero-day vulnerabilities are one of the greatest cybersecurity risks for organizations. These are unknown and unpatched vulnerabilities that attackers exploit to penetrate computer systems and comprom...
Discovering Scattered Spider: The Criminal Threat Using Advanced Tactics and Techniques
By Cyber Defense Center Maticmind (Andrea Mariucci, Riccardo Michetti, Federico Savastano, Ada Spinelli) The Scattered Spider threat actor, UNC9344, made its appearance in 2022 with two targeted attac...
Tasting the Exploit: HackerHood testa l’exploit su Wing FTP Server del CVE‑2025‑47812 da Score 10
This tool is intended solely for authorized educational and penetration testing purposes. The author assumes no responsibility for any misuse or damage caused by this software. Always ensure you have ...
What is cyber warfare? Between geopolitics, economics, and technology.
Cyber warfare is a form of conflict that takes place at the cyber and digital level. This form of warfare has become increasingly widespread in recent years, thanks to the growing dependence of modern...
Featured Articles

The Internet provides a sea of information. We often talk on RHC about Open Source Intelligence (OSINT) and Cyber Threat Intelligence (CTI), i.e. those intelligence disciplines that deal with the rese...

Zero-day vulnerabilities are one of the greatest cybersecurity risks for organizations. These are unknown and unpatched vulnerabilities that attackers exploit to penetrate computer systems and comprom...

By Cyber Defense Center Maticmind (Andrea Mariucci, Riccardo Michetti, Federico Savastano, Ada Spinelli) The Scattered Spider threat actor, UNC9344, made its appearance in 2022 with two targeted attac...

This tool is intended solely for authorized educational and penetration testing purposes. The author assumes no responsibility for any misuse or damage caused by this software. Always ensure you have ...

Cyber warfare is a form of conflict that takes place at the cyber and digital level. This form of warfare has become increasingly widespread in recent years, thanks to the growing dependence of modern...

TapTrap Attack: How to Get Yourself to Click Things Even Your Mom Wouldn’t Approve of
TapTrap exploits user interface animations to bypass Android’s permissions system, allowing it to access sensitive data or trick the user into performing destructive actions, such as factory resetting the device. The TapTrap attack is a type of tapjacking, the mobile

AI will end the traditional software industry just as the Internet has changed traditional media.
Generative AI, including tools like Cursor and ClaudeCode, are dramatically reducing the cost and time of software development. What once cost hundreds or thousands of dollars per token can now be achieved for just a few tens of cents, leading

Critical Vulnerability in the Linux Kernel: A New Privilege Escalation
A critical double-free vulnerability has been discovered in the pipapo set module of the NFT subsystem of the Linux kernel. An unprivileged attacker can exploit this vulnerability by sending a specially crafted netlink message, triggering a double-free with high stability

RHC interviews Sector16, one of the most active hacktivist groups of 2025. “Let’s destroy the present for a better future”
In recent months, two disturbing episodes have shaken public opinion and the Italian cybersecurity sector. The first concerned an Italian hospital, violated in its most sensitive heart: videos of patients and operating rooms ended up online, exposing not only the

Need a Microsoft Windows product key? No problem, ask Chat-GPT.
ChatGPT has once again proven vulnerable to unconventional manipulation: this time it issued valid Windows product keys, including one registered to the major bank Wells Fargo. The vulnerability was discovered during a kind of intellectual provocation: a specialist suggested that

What is Cyber Security? Threats, Cybercrime, Protection, and Work
Cybersecurity has become one of the most important issues in the digital age we live in. With the increase in the number of connected devices, the widespread use of the internet, and the exponential growth of online data, the risk

The History of the Linux Kernel (2 of 2). Early Hackers Up to Version 1.0.
Redazione RHC - July 13th, 2025
Article by Pietro Cornelio and Massimiliano Brolli Previous articles: The history of the Linux Kernel (1 of 2). From Torvalds to the hacker community In the first article we met...

The History of the Linux Kernel (1 of 2). From Torvalds to the Hacker Community
Redazione RHC - July 13th, 2025
Article by Pietro Cornelio and Massimiliano Brolli The history of the Linux Kernel is a story of pure hacking as well as being a miracle of "collaboration". It is the...

Cult of the Dead Cow (cDc). The story of the most famous hacker group.
Redazione RHC - July 13th, 2025
Hacker culture, as we've already discussed, is a fascinating subject that has evolved significantly over time to reach the present day. We talked about its origins in a video dedicated...

Apple 2: the story of a great success.
Redazione RHC - July 13th, 2025
On June 10, 1977, the Apple II went on sale, the historic microcomputer that kicked off the home computing revolution. We'd like to dedicate an article to its history. The...
Sign up for the newsletter