Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Banner Ransomfeed 320x100 1
Redhotcyber Banner Sito 970x120px Uscita 101125

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Cyberattack on Eurofiber France: Find out what happened
Di Redazione RHC - 24/11/2025

On November 13, Eurofiber France, a respected provider of fiber optic network and VPN solutions to many of France’s leading companies, discovered that its systems had been compromised by criminal ha...

Immagine del sito
When the Cloud Falls: How a Small Mistake Brought the Global Internet to Its Knees
Di Gaia Russo - 24/11/2025

This fall, we’ve had quite a bit of a cloud headache, I don’t know if you’ve noticed. That is, AWS, Azure , and then Cloudflare . All of them down, one after the other. A series of outages that ...

Immagine del sito
Microsoft Blocks KMS38 Activation Method for Windows 10 and 11
Di Redazione RHC - 23/11/2025

Users noticed that last week Microsoft developers disabled the offline activation method for Windows 11 and 10 via KMS38, which has been used by hackers around the world for years. However, the offici...

Immagine del sito
ATMs targeted! Cybersecurity experts reveal an attack campaign targeting ATMs.
Di Redazione RHC - 23/11/2025

Group-IB experts presented a detailed analysis of the long-running UNC2891 campaign, which demonstrated the continuing sophistication of ATM attack schemes. Attention focused on the Raspberry Pi, whic...

Immagine del sito
“We Want to Hack You Again!” NSO Group Rejects WhatsApp’s Pegasus Lawsuit
Di Redazione RHC - 22/11/2025

Israeli company NSO Group has appealed a California federal court ruling that bars it from using WhatsApp’s infrastructure to distribute its Pegasus surveillance software. The case, which has been o...

China’s New Era of Robots: Shenzhen at the Center of the Technological Revolution

The 15th Chinese National Games opened with a spectacle that combined sport and technology. Among the highlights were robots capable of playing ancien...
Redazione RHC - 15/11/2025 - 10:33

IndonesianFoods: The Worm That’s Wreaking Havoc on npm and Created 100,000 Packages

A self-propagating worm, named IndonesianFoods , has been discovered in npm . It generates new packets every seven seconds. According to Sonatype, the...
Redazione RHC - 15/11/2025 - 08:43

Vibe-Hacking: The New Frontier of Criminal Cybersecurity

The cybersecurity landscape has accustomed us to constant upheavals. Every year new threats, new scenarios, and new criminal tactics emerge. But today...
Andrea Fellegara - 15/11/2025 - 08:27

Two-Factor Authentication and MFA: Protect Your Accounts in 3 Easy Steps!

Two-factor authentication (2FA) , or more commonly, Multi-Factor Authentication (MFA) , is an effective solution for protecting our online accounts. W...
Redazione RHC - 14/11/2025 - 22:47

John von Neumann: The Multifaceted Genius of 20th-Century Science

We meet the man considered one of the most multifaceted and brilliant scientists of the last century, perhaps equal only to Einstein. He possessed a w...
Carlo Denza - 14/11/2025 - 22:42

The Wayback Machine “of souls” is coming soon. And so are the controversies

Many of us grew up with Hiroshi Shiba, from Jeeg the steel robot who talked to his late father, Professor Senjiro Shiba, a scientist and archaeologist...
Redazione RHC - 14/11/2025 - 18:37
1 12 13 14 15 16 252

China’s New Era of Robots: Shenzhen at the Center of the Technological Revolution

- November 15th, 2025

The 15th Chinese National Games opened with a spectacle that combined sport and technology. Among the highlights were robots capable of playing ancient bronze instruments, artificial intelligence systems capable of...

Facebook Linkedin X

IndonesianFoods: The Worm That’s Wreaking Havoc on npm and Created 100,000 Packages

- November 15th, 2025

A self-propagating worm, named IndonesianFoods , has been discovered in npm . It generates new packets every seven seconds. According to Sonatype, the malware has already created over 100,000 packets...

Facebook Linkedin X

Vibe-Hacking: The New Frontier of Criminal Cybersecurity

- November 15th, 2025

The cybersecurity landscape has accustomed us to constant upheavals. Every year new threats, new scenarios, and new criminal tactics emerge. But today, it's not just technology that's redefining the rules...

Facebook Linkedin X

Two-Factor Authentication and MFA: Protect Your Accounts in 3 Easy Steps!

- November 14th, 2025

Two-factor authentication (2FA) , or more commonly, Multi-Factor Authentication (MFA) , is an effective solution for protecting our online accounts. With the rise of cyberattacks and identity theft, it's crucial...

Facebook Linkedin X

John von Neumann: The Multifaceted Genius of 20th-Century Science

- November 14th, 2025

We meet the man considered one of the most multifaceted and brilliant scientists of the last century, perhaps equal only to Einstein. He possessed a wide range of scientific talents,...

Facebook Linkedin X

The Wayback Machine “of souls” is coming soon. And so are the controversies

- November 14th, 2025

Many of us grew up with Hiroshi Shiba, from Jeeg the steel robot who talked to his late father, Professor Senjiro Shiba, a scientist and archaeologist inside a large computer....

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE