Red Hot Cyber. The Cybersecurity Blog
The Louvre Theft: When Thieves Taught the World the Physical Pen Test
The event that shook the world on October 19, 2025, was not a natural disaster or a financial collapse, but the sensational theft of Napoleon’s jewels from the Louvre Museum. Beyond its historic...
Starting November 12th, age verification for porn sites will be implemented in Italy. What’s changing?
Starting Tuesday, November 12, 2025, new provisions from the Italian Communications Regulatory Authority (AGCOM) will come into force, requiring an age verification system for accessing pornographic w...
AzureHound: The “Legitimate” Tool for Cloud Attacks
AzureHound, part of the BloodHound suite, was born as an open-source tool to help security teams and red teams identify vulnerabilities and escalation paths in Microsoft Azure and Entra ID environment...
Red Hot Cyber launches free real-time CVE Enrichment service
Timeliness is key in cybersecurity. Red Hot Cyber recently launched a completely free service that allows IT professionals, security analysts, and enthusiasts to monitor the most critical vulnerabilit...
Mossad, the rigged supply chain, and intimidated judges
Yossi Cohen, former director of the Mossad, has said publicly two things that usually remain locked away in a room without tape recorders. First, Israel allegedly deployed a global sabotage and survei...
Nvidia invests $1 billion in Nokia to develop 6G networks with AI
Jen-Hsun Huang dropped a bombshell: Nvidia has reportedly invested $1 billion in Nokia. Yes, Nokia is the company that made Symbian phones so popular 20 years ago. In his speech, Jensen Huang said tha...
Microsoft Exchange in the crosshairs: The CISA guide to surviving attacks!
A rapid response to the increasing threats against email infrastructure was provided by the Cybersecurity and Infrastructure Security Agency (CISA), in collaboration with the National Security Agency ...
Russian Interior Ministry officials arrested the creators of the Medusa malware
The Russian programming team behind the Medusa malware has been arrested by officials from the Russian Interior Ministry, with the support of police in the Astrakhan region. According to investigators...
Trump-Xi Summit: A Truce That Doesn’t Benefit Europe
After years of tensions, tariffs, mutual accusations, and trade wars that have shattered the global balance of power, the long-awaited meeting between Donald Trump and Xi Jinping has finally taken pla...
Cloud yes or Cloud no: When the Digital Sky Darkens
The outage of Microsoft’s cloud services, which occurred just hours before the release of its quarterly results, is just the latest in a long series of outages that are exposing a structural vul...
Featured Articles

The event that shook the world on October 19, 2025, was not a natural disaster or a financial collapse, but the sensational theft of Napoleon’s jewels from the Louvre Museum. Beyond its historic...

Starting Tuesday, November 12, 2025, new provisions from the Italian Communications Regulatory Authority (AGCOM) will come into force, requiring an age verification system for accessing pornographic w...

AzureHound, part of the BloodHound suite, was born as an open-source tool to help security teams and red teams identify vulnerabilities and escalation paths in Microsoft Azure and Entra ID environment...

Timeliness is key in cybersecurity. Red Hot Cyber recently launched a completely free service that allows IT professionals, security analysts, and enthusiasts to monitor the most critical vulnerabilit...

Yossi Cohen, former director of the Mossad, has said publicly two things that usually remain locked away in a room without tape recorders. First, Israel allegedly deployed a global sabotage and survei...
Famous hackers: Albert Gonzalez, called Soupnazi
The most famous female hackers ever: Kimberley Vanvaeck aka Gigabyte.
The Most Famous Hacker Girls Ever: Kristina Svechinskaya
Famous Hackers: The Story of Andrian Lamo
Famous hackers: Vladimir Levin and the first online bank robbery.
Famous Hackers: Mafia Boy, the DDoS Wizard

Famous hackers: Albert Gonzalez, called Soupnazi
Redazione RHC - October 18th, 2025
Born to Cuban parents in 1981, Albert Gonzalez attended South Miami High School in Miami, Florida. He was accused of acquiring and reselling over 180 million payment cards between 2005...

The most famous female hackers ever: Kimberley Vanvaeck aka Gigabyte.
Redazione RHC - October 18th, 2025
Gigabyte is the pseudonym of Kimberley Vanvaeck, a Belgian hacker known for writing numerous high-end malware, as well as for a long-running dispute with the security firm Sophos. Gigabyte, when...

The Most Famous Hacker Girls Ever: Kristina Svechinskaya
Redazione RHC - October 18th, 2025
In the collective imagination, the word "hacker" or "computer criminal" is a young man with enormous computer skills, but history has taught us that in a few rare cases this...

Famous Hackers: The Story of Andrian Lamo
Redazione RHC - October 18th, 2025
Adrian Lamo was a hacker who found new ways to breach companies and make them realize how insecure they were. From his early hacks to hacking into prestigious companies while...

Famous hackers: Vladimir Levin and the first online bank robbery.
Redazione RHC - October 18th, 2025
Today we'll meet another hacker from the past. He's Vladimir Levin, a Russian hacker from St. Petersburg (Владимир Леонидович Левин), who became famous for breaking into the servers of the...

Famous Hackers: Mafia Boy, the DDoS Wizard
Redazione RHC - October 18th, 2025
Today we'll learn about another great black hacker from the past. We'll talk about Michael Calce, better known as Mafiaboy, one of the most famous and sought-after hackers in the...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

