Red Hot Cyber. The Cybersecurity Blog

Satoshi Nakamoto: Discover the Mysterious Inventor of Bitcoin.
The true identity of the creator of Bitcoin is one of the biggest mysteries in the tech world. Over the years, many theories have emerged about who Satoshi Nakamoto really is, ranging from a time traveler, an alien, an artificial

After Encrypting Half the World, Hunters International Shuts Down! Decryptor Distributed for Free
Hunters International, the group responsible for one of the largest ransomware attacks in recent years, has officially announced the cessation of its operations. In a statement published on its darknet portal, the group said it wanted to cease operations and

DarkForums Takes Over BreachForums’ Telegram Channel “The Jacuzzi”
The underground landscape of cybercriminal forums continues to evolve and is changing. With an official announcement published on June 25, 2025 both on Telegram and within the DarkForums forum, the user Knox – current administrator and top figure of the

Patch Chaos: Windows 11 Update Breaks PDF Printing
Yes, once again a Windows update has unleashed hell. The harmless “Microsoft Print to PDF” function, a silent ally of users and IT administrators for years, has ended up KO after the April 2025 preview update on Windows 11 24H2

The symbol of the hacker community: today we talk about the Glider.
The hacker culture is a fascinating subject. It is a rich mine of outlandish innovation, genius and intuition. Of bizarre characters, of fatalistic humor, of memes, but above all culture, engineering and science. But while Linux has its penguin, BSD

The hacker group LOpht predicted the future of the Internet in 1998, but the US didn’t listen to them.
“If you’re looking for computer security, then the Internet is not the place to be.” Said Mudge, then 27, with the look of a biblical prophet with long brown hair that fell to his shoulders. “I’ve been told that you

Pig Butchering Scam: How Pig Slaughter Is Becoming an Emotional Addiction Scam
Redazione RHC - July 8th, 2025
In the interconnected labyrinth of the 21st century, where the desire for authenticity and the search for opportunity dance on the edge of paradox, a dark phenomenon emerges that challenges...

A new Poc Exploit allows Privilege Excalation on Linux using the udisksd daemon
Redazione RHC - July 8th, 2025
A proof-of-concept (PoC) exploit for a critical vulnerability that allows local privilege escalation has been developed, affecting several major Linux distributions, such as Fedora and SUSE. The vulnerability, tracked as...

Critical Vulnerabilities in SMBClient for macOS. 9.8 out of 10 for Effective RCE
Redazione RHC - July 8th, 2025
Experts have identified serious vulnerabilities in SMBClient for macOS that affect both user space and the operating system kernel. These vulnerabilities potentially allow remote execution of arbitrary code and disruption...

Discovering Drumrlu. The IaB that does big business between Türkiye and Venezuela
Redazione RHC - July 8th, 2025
After the Far East and Iran, we continue our series of articles on IAB actors with an actor believed to be based in Europe, in a NATO country. Origin and...
Sign up for the newsletter