Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
LECS 320x100 1
Banner Ancharia Desktop 1 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Digital Surveillance at Work: The Rise of Algorithmic Monitoring

Remote work has given employees freedom , but with it has also come digital surveillance . We discussed this some...
Redazione RHC - 24 November 2025

Windows Server Vulnerability Exploited: ShadowPad Malware Deployed

A recently patched vulnerability in Microsoft’s Windows Server update services has led to a series of attacks using one of...
Redazione RHC - 24 November 2025

Salesforce Data Breach: ShinyHunters Hack Gainsight Integration

The growing data leak from the Salesforce ecosystem has taken a new turn after the ShinyHunters group announced its involvement...
Redazione RHC - 24 November 2025

BadAudio Discovered: Ghost Malware Used by APT24 for Three Years Undetected

Researchers at the Google Threat Intelligence Group (GTIG) have uncovered details of an espionage campaign conducted by the Chinese group...
Redazione RHC - 24 November 2025

Satoshi Nakamoto’s Net Worth Drops 34% as Cryptocurrency Crash

The net worth of Satoshi Nakamoto, the mysterious figure known as the founder of Bitcoin, has dropped 34% in the...
Redazione RHC - 24 November 2025

Cyberattack on Eurofiber France: Find out what happened

On November 13, Eurofiber France, a respected provider of fiber optic network and VPN solutions to many of France's leading...
Redazione RHC - 24 November 2025

The world of software vulnerabilities: how they’re exploited, who creates them, and how to protect yourself.

Software vulnerabilities pose a threat to cybersecurity because hackers can exploit them to gain access to computer systems. A software vulnerability is a flaw in software that can be used...
Share on Facebook Share on LinkedIn Share on X

Exploring Cyberspace: States and Wars Without Geographic Borders

The concept of cyber risk is increasingly becoming mainstream. Cybersecurity is a rapidly evolving field. But to help you understand the broader context of what we now call cyberspace, between...
Share on Facebook Share on LinkedIn Share on X

Who invented the World Wide Web? The story of Timothy Berners-Lee, the genius behind the web

We all use the internet every day, at all hours, our smartphone has become an active prosthesis of our body, but have we ever wondered who invented the World Wide...
Share on Facebook Share on LinkedIn Share on X

Marketing is nothing! VPNs sell themselves every time a government blocks adult sites

Hundreds of millions of smartphone users have faced blocking of pornographic websites and mandatory age verification. The UK has introduced mandatory identity verification on adult websites , and similar laws...
Share on Facebook Share on LinkedIn Share on X

Hackers: Who They Are, What They Do, and Their Role in Today’s World

The meaning of " hacker " has deep roots. It derives from the English "to hack," meaning to chip away, cut, strike, or cut. It's a powerful image, that of...
Share on Facebook Share on LinkedIn Share on X

The First Hackers in History: Hacking Is a Journey, Not a Destination

The word hacking comes from the English verb “to hack,” which means “to damage.” Today, with this short article, I will tell you a piece of the history of hacking,...
Share on Facebook Share on LinkedIn Share on X

The extraordinary story of Alan Turing, the father of computer science: from his tumultuous childhood to his revolutionary contributions

Madras, early 1900s. The British Empire dominates India. Julius, a history graduate from Oxford University, serves as a colonial administrative clerk in the Indian Civil Service. He and his wife,...
Share on Facebook Share on LinkedIn Share on X
Evoluzione-da-wep-a-wpa-3

Wi-Fi Security: The Evolution from WEP to WPA3 and Self-Defending Networks

From the weaknesses of WEP to the advances of WPA3 , Wi-Fi network security has come a long way. Today, self-defending networks represent the new frontier: intelligent systems capable of...
Share on Facebook Share on LinkedIn Share on X

The Windows 98 Blue Screen of Death That Changed Microsoft’s Plans

It was April 20, 1998. Microsoft was so embarrassed by the iconic Windows 98 blue screen of death on stage that it decided to change plans for building a new...
Share on Facebook Share on LinkedIn Share on X

Roblox: The Platform That Puts Children’s Safety at Risk

With over 100 million daily active users , Roblox attracts countless children around the world. Nearly half of its audience is under 13, and in Australia, young players spend an...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sito
RansomHouse Ransomware Upgraded: Enhanced Encryption Threat
Redazione RHC - 22/12/2025

The group behind RansomHouse, one of the most notorious ransomware distribution services, has strengthened the technical capabilities of its attacks. According to experts, the cybercriminals have added an updated encryption tool to their arsenal ,…

Immagine del sito
Cyber Attacks on the Rise: Wiper Malware and Data Destruction in 2025
Redazione RHC - 22/12/2025

According to BI.ZONE, by 2025, attackers will increasingly opt for total destruction of corporate infrastructure rather than encryption . This refers to scenarios in which, after penetrating a network, attackers use wipers, destructive tools that…

Immagine del sito
MS13-089 Ransomware: Double Extortion Without Encryption
Inva Malaj - 22/12/2025

MS13-089 opens a leak site on the dark web, exposes the first data and adopts a double extortion strategy without encryption. A brand built on an old Microsoft ID For years, “MS13-089” identified a 2013…

Immagine del sito
Microsoft Shifts Activation Process: What It Means for Air-Gapped Systems
Redazione RHC - 22/12/2025

In the past, many users and system administrators have relied on Microsoft’s telephone activation service to manage installations in specific contexts. During the Windows 8 era, MAK ( Multiple Activation Key) licenses were widely available.…

Immagine del sito
DIG AI: The Dark Web’s New AI Tool for Cybercrime
Redazione RHC - 21/12/2025

A new AI tool has appeared on the dark web and quickly attracted the attention of security experts, and not for the best of reasons. This is an artificial intelligence service called DIG AI, which…