Red Hot Cyber. The Cybersecurity Blog

FortiGate Under Attack: Tools for Mass Exploitation of Exposed APIs for Sale
A new and alarming development is shaking up the cybersecurity landscape: a malicious actor has advertised on the dark web a highly sophisticated exploit aimed at compromising FortiGate devices. A new exploit priced at $12,000 for FortiGate firewalls has appeared

Breadcrumbing: Understanding Emotional Manipulation to Better Defend Yourself in the Digital Domain
This article aims to explore the phenomenon of breadcrumbing from a psychological perspective, metaphorically linking it to the insidious strategies that attackers use in cybersecurity. We will discover how understanding human relational dynamics can offer us valuable tools to defend

Connected and Vulnerable: How to Secure OT and ICS in 2025
In today’s interconnected world, cybersecurity is not just about protecting information. Today, most devices and physical tools are connected to the network in some way. Whether for its structural operation or for remote maintenance or monitoring activities, all the tools

Darkcloux 3.0 is here: Securonis Linux becomes more secure (and more extreme) than ever
Securonis Linux has released its most significant update: version 3.0 of “Darkcloux” and the 3.0-r1 patch. The release includes new utilities, redesigned components, and improvements to privacy and security. The main change is the end of support for the GNOME environment. From

Urobot watches you while you pee (but it’s for your own good)
A Taiwanese hospital is testing Urobot, a smart urinal that instantly analyzes urine and emails the results. Although the device is designed in a “cute” style, social media users have noted that it looks scary and causes discomfort to patients.

Smart TV or Living Room Spies? Here’s How They’re Monitoring You
Many owners of smart TV operating systems are increasingly finding themselves caught in a conflict that rages between the desire to preserve viewer privacy and pressure from the advertising industry. The point is that TV manufacturers and embedded software developers

Cyber Security: CISA and NSA Recommend Secure Programming Languages
Redazione RHC - June 28th, 2025
The main US cybersecurity agencies, CISA and NSA, have published a joint document recommending that software developers opt for programming languages considered "memory safe". These languages are designed to provide...

Apple and Google under pressure: German regulator wants to remove DeepSeek
Redazione RHC - June 28th, 2025
Following the Italian data protection regulator, Germany's data protection watchdog has now asked Apple and Alphabet subsidiary Google to remove the Chinese artificial intelligence (AI) startup's DeepSeek app from their...

A former Australian university student has been accused of hacking Western Sydney University
Redazione RHC - June 28th, 2025
New South Wales police have arrested a 27-year-old former Western Sydney University student who had repeatedly hacked into the university's systems, including to obtain cheaper parking. Western Sydney University is...

Cyber War: The Invisible War in Cyberspace That Decides the Conflicts of the Present
Paolo Galdieri - June 27th, 2025
In the heart of contemporary conflicts, alongside tanks, drones and troops, an invisible, silent and often underestimated war is being fought: cyber war. It is not just a futuristic scenario...
Sign up for the newsletter