Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Banner Ransomfeed 320x100 1
Redhotcyber Banner Sito 970x120px Uscita 101125

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Anonymity for Sale: Russian SIM Card Market Thrives Amid Regulations Cybercrime

Anonymity for Sale: Russian SIM Card Market Thrives Amid Regulations

Efforts by legislators and law enforcement to combat money laundering and more complex SIM card verification procedures have not significantly...
Redazione RHC - 4 December 2025
Hackers Compromise 120k IP Cameras for Pornographic Videos Cybercrime

Hackers Compromise 120k IP Cameras for Pornographic Videos

South Korean police have reported the arrest of four individuals who, presumably independently, compromised over 120,000 IP cameras. According to...
Redazione RHC - 4 December 2025
Microsoft Fixes Old Windows LNK Vulnerability Exploited in Attacks Cybercrime

Microsoft Fixes Old Windows LNK Vulnerability Exploited in Attacks

Microsoft has quietly patched a long-standing Windows vulnerability that has been exploited in real-world attacks for several years. The update...
Redazione RHC - 4 December 2025
Critical React Server Vulnerability: Update Now to Prevent RCE Attacks Cybercrime

Critical React Server Vulnerability: Update Now to Prevent RCE Attacks

Developers and administrators around the world are urgently updating their servers following the discovery of a critical vulnerability in React...
Redazione RHC - 4 December 2025
Critical Vulnerability in King Addons for Elementor Exploited Cybercrime

Critical Vulnerability in King Addons for Elementor Exploited

During the registration process, a critical security flaw (CVE-2025-8489) in the King Addons WordPress Elementor plugin was exploited by attackers,...
Redazione RHC - 4 December 2025
Google Discover AI Headlines: Revolutionizing News Feed or Clickbait Nightmare? Cybercrime

Google Discover AI Headlines: Revolutionizing News Feed or Clickbait Nightmare?

Google is testing AI-generated headlines in its Discover feed, replacing original news headlines with original ones. Sean Hollister, editor-in-chief of...
Redazione RHC - 4 December 2025

Top Malware: Flame, the modular “spy” malware targeting the Middle East.

Flame, (also known as Flamer, sKyWIper, Skywiper), is a modular computer malware discovered in 2012 that attacked Middle Eastern target computers running the Microsoft Windows operating system. The program's primary...
Share on Facebook Share on LinkedIn Share on X

Slammer, the first worm to use a bug that hasn’t been fixed for six months.

Many years have passed since the SQL Slammer worm spread uncontrollably on January 25, 2003. It was one of the fastest-spreading malware in history , and with this article we...
Share on Facebook Share on LinkedIn Share on X

The Story of the First Keylogger: How Hidden Keyboard Control Came to Be

We all know Bruce Schneier , a renowned cryptography and computer security expert, member of the board of directors of the International Association for Cryptological Research and a renowned speaker,...
Share on Facebook Share on LinkedIn Share on X

A Brief History of Malware: The Evolution of the Species from Its Origins to the Present Day

At first we talked about “viruses” , then “worms” appeared, followed by “macro viruses”. These were soon joined by other types of hostile software such as keyloggers or lockers. At...
Share on Facebook Share on LinkedIn Share on X

What Are Large Language Models? Behind the Scenes of Artificial Intelligence

In the rapidly evolving world of artificial intelligence (AI), one term has emerged with increasing importance: Language Model, especially large language models, then called Large Language Models. You've likely already...
Share on Facebook Share on LinkedIn Share on X

Let’s discover the differences between a Machine Learning and Deep Learning algorithm

In the world of artificial intelligence, we often hear two terms: machine learning (ML) and deep learning (DL). Both are methods for implementing AI through the training of machine learning...
Share on Facebook Share on LinkedIn Share on X

Hallucination in Artificial Intelligence: Between Strange and Disturbing Errors

Hallucinating, for a human, means perceiving things that aren't actually present in our environment. When we talk about "hallucinations" in artificial intelligence (AI), we're referring to a situation in which...
Share on Facebook Share on LinkedIn Share on X

How do machines learn? Let’s explore supervised, unsupervised, and reward learning approaches.

Artificial intelligence isn't about magic, it's about learning! This article aims to demystify the esotericism surrounding artificial intelligence (AI) by providing a comprehensive answer to the question , "How do...
Share on Facebook Share on LinkedIn Share on X

Difference between a classical algorithm and an AI software

In the digital age we live in, artificial intelligence (AI) is gaining increasing attention. But what distinguishes a classical algorithm from AI software? In this article, we'll explore the differences...
Share on Facebook Share on LinkedIn Share on X

What is a neural network? Discover the technology behind artificial intelligence.

In the contemporary technological landscape, one term stands out: neural network. The foundation of artificial intelligence, neural networks represent the future of how we interact with technology. But what exactly...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCulture
Net-NTLMv1 Exploitation: Rainbow Tables for Modern Attacks
Redazione RHC - 18/01/2026

Mandiant has released a large set of rainbow tables dedicated to Net-NTLMv1 with the aim of concretely demonstrating how insecure this authentication protocol has become. Although Net-NTLMv1 has been deprecated for years and its weaknesses…

Immagine del sitoCybercrime
Your paycheck is zero! Congratulations, someone answered the phone wrong
Redazione RHC - 18/01/2026

No worker would accept their paycheck disappearing without explanation. It was precisely from a series of internal reports of this nature that an organization began investigating an apparently administrative anomaly, discovering instead a targeted cyber…

Immagine del sitoCybercrime
Two Ukrainians Suspected in Black Basta Ransomware Attacks
Redazione RHC - 17/01/2026

When it comes to cybersecurity, it’s not uncommon to come across news stories that seem straight out of a science fiction movie. Yet, the reality is even more surprising and sometimes disturbing. The story of…

Immagine del sitoCybercrime
Gootloader Malware Returns with Enhanced Evasion Techniques
Redazione RHC - 17/01/2026

After a long period of silence, the Gootloader downloader malware has returned to the forefront. Last November, the Huntress team detected a new campaign signaling the return of a developer previously associated with the Vanilla…

Immagine del sitoCybercrime
VoidLink Malware: Advanced Linux Framework Targets Cloud Infrastructures
Redazione RHC - 16/01/2026

Check Point researchers have discovered a new Linux infection framework distinguished by its advanced modular architecture and wide range of features. The malware has been dubbed VoidLink . The framework is composed of over 30…