Red Hot Cyber. The Cybersecurity Blog

Patch Chaos: Windows 11 Update Breaks PDF Printing
Yes, once again a Windows update has unleashed hell. The harmless “Microsoft Print to PDF” function, a silent ally of users and IT administrators for years, has ended up KO after the April 2025 preview update on Windows 11 24H2

The symbol of the hacker community: today we talk about the Glider.
The hacker culture is a fascinating subject. It is a rich mine of outlandish innovation, genius and intuition. Of bizarre characters, of fatalistic humor, of memes, but above all culture, engineering and science. But while Linux has its penguin, BSD

The hacker group LOpht predicted the future of the Internet in 1998, but the US didn’t listen to them.
“If you’re looking for computer security, then the Internet is not the place to be.” Said Mudge, then 27, with the look of a biblical prophet with long brown hair that fell to his shoulders. “I’ve been told that you

Linux Pwned! Privilege Escalation on SUDO in 5 seconds. HackerHood tests the CVE-2025-32463 exploit
Yesterday, Red Hot Cyber published an in-depth analysis of a gserious vulnerability discovered in SUDO (CVE-2025-32463), which allows escalation of privileges to root in Linux environments by exploiting an abuse of the chroot function. The exploit, made public by Stratascale,

North Korean Hackers on the Payroll: How Companies Paid Salaries to North Korean IT Specialists
The US Department of Justice has announced the discovery ofa large-scale scheme in which fake IT specialists from the DPRK obtained jobs at American companies by posing as citizens of other countries. In fact, we at Red Hot Cyber have

The Story of Open Source: A Success Story of Humankind
Author: Massimiliano Brolli, Pietro CornelioPublishing Date: 11/01/2021 Open source software is so present and integrated into our daily lives today that it would be difficult to think of a world without it. Talking about Linux, Android, Apache, are just some

“As We May Think”. The Visionary Essay of Vannevar Bush
Redazione RHC - July 8th, 2025
Today I would like to bring to light a revolutionary essay, a source of inspiration for many scientists who have contributed to technological innovation, especially in computer science in the...

Who are the most famous hackers in history?
Redazione RHC - July 8th, 2025
We often talk about hackers, but who are the famous hackers that ever existed? Considered by many as eccentric geniuses and computer wizards, by others they have the appearance of...

Underwater cables and the “cyber war of the seabed”. Between control, geopolitics and technology.
Redazione RHC - July 8th, 2025
Author: 5ar0m4n Publishing Date: 11/7/2021 We have often addressed the topic of undersea cables on RHC where we talked about the first submarine cable in history and the last one...

Pig Butchering Scam: How Pig Slaughter Is Becoming an Emotional Addiction Scam
Redazione RHC - July 8th, 2025
In the interconnected labyrinth of the 21st century, where the desire for authenticity and the search for opportunity dance on the edge of paradox, a dark phenomenon emerges that challenges...
Sign up for the newsletter