Red Hot Cyber. The Cybersecurity Blog
Intel releases urgent patches for new Spectre variant
VUSec researchers have presented a paper titled “Training Solo,” which challenges the fundamental principles of protection against Spectre-v2 attacks. Previously , the domain isolation mec...
Famous hackers: Vladimir Levin and the first online bank robbery.
Today we’ll meet another hacker from the past. He’s Vladimir Levin, a Russian hacker from St. Petersburg (Владимир Леонидович Левин), who became famous for breaking into the servers of the...
Cyber Attack on European Airports: Everest Ransomware Claims Claim
On September 20, we reported on a cyberattack that paralyzed several European airports, including Brussels, Berlin, and London Heathrow. This was a supply chain attack that exploited the compromise of...
Inmates hack prison: sentences reduced, funds transferred, and unauthorized visits
The Romanian penitentiary system has found itself at the center of a major digital scandal: inmates in Târgu Jiu hacked the PNA’s internal platform and, for several months, managed data on priso...
WiFi: From Marconi’s Origins to the Wireless Network We Know Today
Today, we live in a world where WiFi is a fundamental necessity, but how did this technology, now taken for granted, come about? How did it then develop into the network we now use every day? In this ...
Operation SIMCARTEL: 1,200 SIM boxes and 40,000 SIM cards stopped by Europol
On October 10, 2025, Latvian authorities conducted a day of action that resulted in the arrest of five Latvian citizens suspected of running a large-scale cyber fraud network. The operation, dubbed SI...
Nvidia loses 95% of the Chinese AI market! Export restrictions cause its share to plummet
Jen-Hsun Huang, founder and CEO of Nvidia, revealed that recent export restrictions have drastically reduced the presence of the company’s AI chips in China , from 95% to virtually nothing. “Four year...
Cyberdrones, radar evasion, and autonomous swarms: Rome, the invisible challenge of Jubilee 2025
Jubilee 2025 in Rome presents a challenge not only for managing millions of pilgrims and tourists, but also for protecting urban airspace. Drones, increasingly widespread and accessible, bring with th...
Bus becomes travelling museum of retro computers in UK
In the UK, father and son Jason and Luke Stoner have transformed an old school bus into a traveling museum dedicated to retro computers and game consoles. The inspiration came when Luke visited the fa...
100 years of Italian Intelligence! Mattarella celebrates the SIM’s centenary at the Quirinale Palace
October 15, 2025 marks an anniversary of exceptional importance in the history of Italian national security: one hundred years since the birth of the Military Information Service (SIM) , the country&#...
Featured Articles

VUSec researchers have presented a paper titled “Training Solo,” which challenges the fundamental principles of protection against Spectre-v2 attacks. Previously , the domain isolation mec...

Today we’ll meet another hacker from the past. He’s Vladimir Levin, a Russian hacker from St. Petersburg (Владимир Леонидович Левин), who became famous for breaking ...

On September 20, we reported on a cyberattack that paralyzed several European airports, including Brussels, Berlin, and London Heathrow. This was a supply chain attack that exploited the compromise of...

The Romanian penitentiary system has found itself at the center of a major digital scandal: inmates in Târgu Jiu hacked the PNA’s internal platform and, for several months, managed data on pris...

Today, we live in a world where WiFi is a fundamental necessity, but how did this technology, now taken for granted, come about? How did it then develop into the network we now use every day? In this ...
The Warlock Group: A New Player in the Ransomware Market
Cyberwar in Italy: The government brings the army into cyberspace.
FBI warns of fake websites impersonating IC3 to commit fraud
Apple attacks Google Chrome: “Switch to Safari to protect your privacy.”
AI in the Hands of Criminal Hackers: The Game Has Changed, and We’re at a Disadvantage
Samsung under attack in Italy: phones held hostage by ransomware

The Warlock Group: A New Player in the Ransomware Market
Redazione RHC - September 23rd, 2025
The Warlock group, also known as Storm-2603 and GOLD SALEM , has gone from being a newcomer to a major player in the ransomware market in just a few months....

Cyberwar in Italy: The government brings the army into cyberspace.
Paolo Galdieri - September 23rd, 2025
Cyberspace is no longer a marginal dimension but a true strategic operational domain. Its relevance is now comparable to that of land, sea, air, and space. Technological acceleration driven by...

FBI warns of fake websites impersonating IC3 to commit fraud
Redazione RHC - September 23rd, 2025
The FBI has issued a warning : scammers are impersonating the Internet Fraud Complaint Center (IC3) website to commit financial fraud or steal visitors' personal information. "Attackers create fake websites,...

Apple attacks Google Chrome: “Switch to Safari to protect your privacy.”
Redazione RHC - September 23rd, 2025
Apple has issued a stern warning: stop using Google Chrome. The world's most popular browser is competing with both desktops and smartphones, gradually taking market share from Apple. But the...

AI in the Hands of Criminal Hackers: The Game Has Changed, and We’re at a Disadvantage
Ivan Garzaro - September 23rd, 2025
In recent months, during my research and studies, I have come across a reality as surprising as it is worrying: how easily it is possible to identify exposed systems on...

Samsung under attack in Italy: phones held hostage by ransomware
Michele Pinassi - September 23rd, 2025
For a few days now, news has been circulating, which I don't think has been confirmed by official sources, of a ransomware attack carried out through Samsung's "corporate fleet" management...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE