Red Hot Cyber. The Cybersecurity Blog

The other side of cybersecurity: stress and burnout are “by design” in domain experts
We often talk about cyber security and the importance of a complete cyber program today. Today, however, we will focus on analyzing another important point in the profession of the cyber security expert : stress. Many aspiring cybersecurity professionals dream

Musk’s Supercomputer in Memphis is ready! 100,000 liquid-cooled Nvidia H1s.
Elon Musk, who simultaneously heads six innovative companies-Tesla, SpaceX, Starlink, X (formerly known as Twitter), Neuralink, and xAI-is not stopping there. He recently announced that xAI has begun training its models on the world’s most powerful artificial intelligence cluster: the

Microsoft releases USB tool to fix CrowdStrike BSOD problem on Windows 10 and 11
Microsoft has released a tool for system administrators to simplify the process of fixing the blue screen of death (BSOD) on Windows 10 and 11 computers. The solution involves the use of a bootable USB drive and a special script

PoC Released for SQL Injection Without Authentication on WordPress WZone Plugin
A proof of concept (PoC) for a critical vulnerability identified as CVE-2024-33544 has recently been released. This vulnerability involves an unauthenticated SQL injection, which poses a serious threat to the security of many web applications. The National Vulnerability Database (NVD)

Threat Actor IntelBroker Exposes Rapid4Cloud Data on Breach Forums
In the world of cybersecurity, news of data breaches is commonplace. Recently, a new alleged breach has made waves: the moderator of BreachForums, known as IntelBroker, has claimed to have leaked the source codes (SRC) of various Rapid4Cloud products. Details

Sale of a 0Day RCE Exploit for GLPI HelpDesk
Recently, a user on the Breachforums known as “cisc0” posted an announcement regarding the sale of a 0Day exploit for GLPI HelpDesk. According to the user, this exploit works on all versions of the software without exception. The news has

The Story Of Conti Ransomware – The Last Ceremony (Final Episode)
Alessio Stefan - January 8th, 2025
This is the last episode of “The Story Of Conti Ransomware” series, we would finally reach the decline of the group and what this means for the current ransomware landscape....

The Fall of the Human Conscience: Programming Desensitization
Olivia Terragni - January 4th, 2025
Author: Ashleigh Crause Is our Obsessive use of technology making us insensitive? “Technology - Ashleigh Crause tells us - is, by far, one of the most amazing inventions to date”....

Harley-Davidson Targeted by Cyber Criminals: 888 Claims Data Breach
RHC Dark Lab - December 31st, 2024
Recently, a threat actor on an underground forum posted an alleged data breach. According to reports, the famous American company Harley-Davidson has been the victim of a data breach that...

FBI responds to threats and announcement of LockBit 4.0
Alessio Stefan - December 22nd, 2024
In the last month of 2024, LockBit has been exodusively talked about. The prominent news is the long-awaited release of the 4.0 program of the most famous RaaS in the...
Sign up for the newsletter