Red Hot Cyber. The Cybersecurity Blog

Patch Chaos: Windows 11 Update Breaks PDF Printing
Yes, once again a Windows update has unleashed hell. The harmless “Microsoft Print to PDF” function, a silent ally of users and IT administrators for years, has ended up KO after the April 2025 preview update on Windows 11 24H2

The symbol of the hacker community: today we talk about the Glider.
The hacker culture is a fascinating subject. It is a rich mine of outlandish innovation, genius and intuition. Of bizarre characters, of fatalistic humor, of memes, but above all culture, engineering and science. But while Linux has its penguin, BSD

The hacker group LOpht predicted the future of the Internet in 1998, but the US didn’t listen to them.
“If you’re looking for computer security, then the Internet is not the place to be.” Said Mudge, then 27, with the look of a biblical prophet with long brown hair that fell to his shoulders. “I’ve been told that you

Linux Pwned! Privilege Escalation on SUDO in 5 seconds. HackerHood tests the CVE-2025-32463 exploit
Yesterday, Red Hot Cyber published an in-depth analysis of a gserious vulnerability discovered in SUDO (CVE-2025-32463), which allows escalation of privileges to root in Linux environments by exploiting an abuse of the chroot function. The exploit, made public by Stratascale,

North Korean Hackers on the Payroll: How Companies Paid Salaries to North Korean IT Specialists
The US Department of Justice has announced the discovery ofa large-scale scheme in which fake IT specialists from the DPRK obtained jobs at American companies by posing as citizens of other countries. In fact, we at Red Hot Cyber have

The Story of Open Source: A Success Story of Humankind
Author: Massimiliano Brolli, Pietro CornelioPublishing Date: 11/01/2021 Open source software is so present and integrated into our daily lives today that it would be difficult to think of a world without it. Talking about Linux, Android, Apache, are just some

123 Stealer is coming! $120 a month subscription to steal any confidential data
Redazione RHC - July 7th, 2025
A new infostealer emerges from the criminal underground and its name is "123 | Stealer". The author of this software is a hacker who hides under the pseudonym koneko. He...

Pig Butchering Scam: How Pig Slaughter Is Becoming an Emotional Addiction Scam
Redazione RHC - July 7th, 2025
In the interconnected labyrinth of the 21st century, where the desire for authenticity and the search for opportunity dance on the edge of paradox, a dark phenomenon emerges that challenges...

He’s 13 and Hacked Microsoft Teams! The Story of Dylan, One of the Youngest Bug Hunters
Redazione RHC - July 6th, 2025
At just 13 years old, Dylan became the youngest security researcher to collaborate with the Microsoft Security Response Center (MSRC), demonstrating how curiosity and perseverance can have a real impact,...

He’s 13 and Hacked Microsoft Teams! The Story of Dylan, One of the Youngest Bug Hunters
Redazione RHC - July 6th, 2025
At just 13 years old, Dylan became the youngest security researcher to collaborate with the Microsoft Security Response Center (MSRC), demonstrating how curiosity and perseverance can have a real impact,...
Sign up for the newsletter