Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
2nd Edition GlitchZone RHC 320x100 2
UtiliaCS 970x120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
The tale of the Mayor who thought of banning axes… but then came the Saws
Di Stefano Gazzella - 09/11/2025

Once upon a time, there was a town that had a Magical Forest. It was happy to have it, even a little proud. Which is why all the citizens willingly sacrificed a few small comforts to keep it safe and ...

Immagine del sito
WhatsApp used to spread LANDFALL, the new spyware for Android Samsung
Di Redazione RHC - 09/11/2025

Researchers at Palo Alto Networks Unit 42 have discovered a new, previously unknown family of Android spyware called LANDFALL . To spread it, malicious actors exploited a zero-day vulnerability (CVE-2...

Immagine del sito
Trump and Kim Jong Un summit? There seems to be a high probability of a meeting.
Di Redazione RHC - 09/11/2025

South Korean intelligence agencies , including the National Intelligence Service, reportedly believe there is a high probability that US President Donald Trump will hold a summit with North Korean Wor...

Immagine del sito
New York sues Facebook, Instagram, TikTok, and YouTube over youth mental health crises
Di Redazione RHC - 09/11/2025

The City of New York filed a lawsuit on Wednesday against a group of prominent social media platforms, including TikTok, YouTube, Instagram, and Facebook, accusing them of contributing to a mental hea...

Immagine del sito
Microsoft’s new goal for artificial intelligence? Medicine!
Di Redazione RHC - 08/11/2025

The tech giant has announced the creation of a new development team for a “superhuman” artificial intelligence that will outperform human experts in medical diagnoses. The team will be led...

The Truth About Windows XP License Key: FCKGW-RHQQ2-YXRKT-8TG6W-2B7Q8

On October 10, new revelations emerged regarding one of the most notorious license keys in computing history: FCKGW-RHQQ2-YXRKT-8TG6W-2B7Q8 , tied to ...
Redazione RHC - 10/10/2025 - 16:39

Intel and NVIDIA: From Historic Rivals to Partners in the New Artificial Intelligence Market

During an interview with Mad Money host Jim Cramer, NVIDIA CEO Jen-Hsun Huang recalled a key moment from his time with Intel. The interview, reported ...
Redazione RHC - 10/10/2025 - 16:26

7-Zip Vulnerable: Symbolic Link Exploit Allows Malicious Code Injection

Two critical vulnerabilities in the 7-Zip archiver allowed remote code execution when processing ZIP files. The flaws affect how the program handles s...
Redazione RHC - 10/10/2025 - 15:52

Salesforce refuses to pay ransom for Scattered Lapsus Hunters attacks

Salesforce representatives have announced that they have no intention of negotiating or paying a ransom to the attackers responsible for a series of l...
Redazione RHC - 10/10/2025 - 10:11

40,000 iPhones stolen and shipped to Asia: London police arrest international gang

London police announced that Operation Echosteep has uncovered and dismantled a gang responsible for mass iPhone thefts. Investigators estimate the gr...
Redazione RHC - 10/10/2025 - 09:55

Tetris: The game that challenges the limits of modern supercomputers

First released in 1984 by Russian programmer Alexey Pajitnov , Tetris quickly became a global phenomenon. Born as digital entertainment, the puzzle ga...
Redazione RHC - 10/10/2025 - 09:08
1 44 45 46 47 48 227

The Truth About Windows XP License Key: FCKGW-RHQQ2-YXRKT-8TG6W-2B7Q8

- October 10th, 2025

On October 10, new revelations emerged regarding one of the most notorious license keys in computing history: FCKGW-RHQQ2-YXRKT-8TG6W-2B7Q8 , tied to Windows XP . For years, this character sequence has...

Facebook Linkedin X

Intel and NVIDIA: From Historic Rivals to Partners in the New Artificial Intelligence Market

- October 10th, 2025

During an interview with Mad Money host Jim Cramer, NVIDIA CEO Jen-Hsun Huang recalled a key moment from his time with Intel. The interview, reported on October 9 by Fast...

Facebook Linkedin X

7-Zip Vulnerable: Symbolic Link Exploit Allows Malicious Code Injection

- October 10th, 2025

Two critical vulnerabilities in the 7-Zip archiver allowed remote code execution when processing ZIP files. The flaws affect how the program handles symbolic links within archives, allowing directory traversal and...

Facebook Linkedin X

Salesforce refuses to pay ransom for Scattered Lapsus Hunters attacks

- October 10th, 2025

Salesforce representatives have announced that they have no intention of negotiating or paying a ransom to the attackers responsible for a series of large-scale attacks that resulted in the theft...

Facebook Linkedin X

40,000 iPhones stolen and shipped to Asia: London police arrest international gang

- October 10th, 2025

London police announced that Operation Echosteep has uncovered and dismantled a gang responsible for mass iPhone thefts. Investigators estimate the group is responsible for 40% of all phone thefts in...

Facebook Linkedin X

Tetris: The game that challenges the limits of modern supercomputers

- October 10th, 2025

First released in 1984 by Russian programmer Alexey Pajitnov , Tetris quickly became a global phenomenon. Born as digital entertainment, the puzzle game has captivated hundreds of millions of people...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE