Red Hot Cyber. The Cybersecurity Blog
Featured Articles

In today’s environment, securing a network requires much more than setting a complex password. A cyber attack against a wireless network follows a structured path that evolves from passive monitorin...

Post 462 on Durov’s official channel immediately went into “scream mode”: “ The end of the free internet. The free internet is becoming a tool of control .” No birthday wishes. Durov explain...

Security researchers have discovered a sophisticated exploit campaign that leverages a private out-of-band application security testing (OAST) service hosted on Google Cloud infrastructure. The campai...

The underground cybercrime market continues to evolve rapidly, fueled by specialized groups designing and selling tools for increasingly sophisticated digital scams. Among these, a particularly active...

American aviation and defense components manufacturer ADC Aerospace has found itself in the spotlight due to a possible cyber attack by the Play ransomware group, which appeared on their blog where cr...
IndonesianFoods: The Worm That’s Wreaking Havoc on npm and Created 100,000 Packages
Vibe-Hacking: The New Frontier of Criminal Cybersecurity
Two-Factor Authentication and MFA: Protect Your Accounts in 3 Easy Steps!
John von Neumann: The Multifaceted Genius of 20th-Century Science
The Wayback Machine “of souls” is coming soon. And so are the controversies
The AI market is in crisis: NVIDIA and other tech giants are declining.

IndonesianFoods: The Worm That’s Wreaking Havoc on npm and Created 100,000 Packages
Redazione RHC - November 14th, 2025
A self-propagating worm, named IndonesianFoods , has been discovered in npm . It generates new packets every seven seconds. According to Sonatype, the malware has already created over 100,000 packets...

Vibe-Hacking: The New Frontier of Criminal Cybersecurity
Andrea Fellegara - November 14th, 2025
The cybersecurity landscape has accustomed us to constant upheavals. Every year new threats, new scenarios, and new criminal tactics emerge. But today, it's not just technology that's redefining the rules...

Two-Factor Authentication and MFA: Protect Your Accounts in 3 Easy Steps!
Redazione RHC - November 13th, 2025
Two-factor authentication (2FA) , or more commonly, Multi-Factor Authentication (MFA) , is an effective solution for protecting our online accounts. With the rise of cyberattacks and identity theft, it's crucial...

John von Neumann: The Multifaceted Genius of 20th-Century Science
Carlo Denza - November 13th, 2025
We meet the man considered one of the most multifaceted and brilliant scientists of the last century, perhaps equal only to Einstein. He possessed a wide range of scientific talents,...

The Wayback Machine “of souls” is coming soon. And so are the controversies
Redazione RHC - November 13th, 2025
Many of us grew up with Hiroshi Shiba, from Jeeg the steel robot who talked to his late father, Professor Senjiro Shiba, a scientist and archaeologist inside a large computer....

The AI market is in crisis: NVIDIA and other tech giants are declining.
Redazione RHC - November 13th, 2025
Artificial intelligence has been the biggest trend in recent years, as the stock prices of AI-related tech giants have skyrocketed. NVIDIA has surpassed the $5 trillion market cap, becoming a...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

