Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

Red Hot Cyber. The Cybersecurity Blog

- July 12th, 2025 - (Posted in Cybercrime and Darknet)
Cyber warfare is a form of conflict that takes place at the cyber and digital level. This form of warfare has become increasingly widespread in recent years, thanks to the growing dependence of modern societies on technology and information. In this article, we will explore the nature of cyber warfare,...

Pope warns: “AI is not the devil, but it can become one without ethics”

The head of the Catholic Churchhas expressed concern about the way today’s children and adolescents interact with digital technologies. In his viewthe abundance of information available through neural networks and other intelligent systems can seriously affect the mental and intellectual

Warning! WinRAR: Critical Vulnerability That Could Run Malware

WinRAR developers have fixed a Directory Traversal vulnerability, which has been assigned the identifier CVE-2025-6218. Under certain circumstances, this bug allowed malware to be executed after the archive was extracted. The vulnerability received a score of 7.8 on the CVSS

A new fileless infostealer is being spread by Telegram and legitimate services

TLP: AMBERAnalyst: Agostino Pellegrino, Crescenzo Cuoppolo, Alessio BandiniLast revision date: 2025-06-24 This forensic technical report documents the complete analysis of a multi-stage infostealer delivered via a Python fileless loader, identified with the acronym “AP”. The entire infection chain runs in

The Story of Open Source: A Success Story of Humankind

- July 2nd, 2025

Author: Massimiliano Brolli, Pietro CornelioPublishing Date: 11/01/2021 Open source software is so present and integrated into our daily lives today that it would be difficult to think of a world...

  

Do you really know what Hacktivism means? It’s a “special message of hope!”

- July 2nd, 2025

“Hacktivism, a special message of hope." Thus begins the "Hacktivism Declaration", published on July 4, 2001 by the famous hacker group Cult of the dead Cow (also called cDc or...

  

The History of FreeBSD

- July 2nd, 2025

We have often talked about Linux and the open source world, Windows and proprietary software and operating systems in general. But starting from the seed of Ken Thompson's Unix, many...

  

HoneyPLC: the new honeypot that revolutionizes the defense of industrial plants

- July 2nd, 2025

Industrial Control Systems (ICS), critical to the operation of critical infrastructure such as power, water and transportation networks, are increasingly vulnerable to cyberattacks. In this context, the article HoneyPLC: A...

  

Sign up for the newsletter