Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The underground cybercrime market continues to evolve rapidly, fueled by specialized groups designing and selling tools for increasingly sophisticated digital scams. Among these, a particularly active...

American aviation and defense components manufacturer ADC Aerospace has found itself in the spotlight due to a possible cyber attack by the Play ransomware group, which appeared on their blog where cr...

This article analyzes the disclosure submitted to Microsoft and available in English on digitaldefense , where images, demonstration videos and a Python code example are available. In recent years, di...

Airbus has announced the recall of approximately 6,500 A320 aircraft due to potential failures in the ELAC control system caused by powerful solar flares. The recall followed a sudden loss of altitude...

Italian defense company Leonardo has unveiled its new Michelangelo Dome system . According to the company, it is designed to counter hypersonic missiles and mass drone attacks . During the technical p...
Discovering the NIS2 Directive: Security and Resilience of Digital Systems in the European Union
Kraken Arrives: The New Ransomware That Assesses Your Environment to Inflict Maximum Damage
North Korea reorganizes its intelligence with a new agency
Cognitive Biases and Cybersecurity: The Fatal Fallacy of “I Have Nothing to Hide”
Did they give you a digital photo frame? It’s more than just family memories.
What are PsyOps? Exploring mind manipulation in the digital age.

Discovering the NIS2 Directive: Security and Resilience of Digital Systems in the European Union
Riccardo Nuti - November 14th, 2025
On 10 November 2022, the European Parliament, by a large majority, approved the NIS2 (Network and Information System Security) Directive with its publication in the Official Journal of the European...

Kraken Arrives: The New Ransomware That Assesses Your Environment to Inflict Maximum Damage
Redazione RHC - November 14th, 2025
Cisco Talos researchers have detected an active wave of attacks using a new ransomware called Kraken. The group began operating in February 2025 and uses double-extortion methods, without targeting specific...

North Korea reorganizes its intelligence with a new agency
Redazione RHC - November 14th, 2025
North Korea has restructured its intelligence hierarchy, transforming the former Intelligence Agency into a structure with a much broader mandate. The new body, called the General Intelligence Directorate (GIRD), brings...

Cognitive Biases and Cybersecurity: The Fatal Fallacy of “I Have Nothing to Hide”
Fabrizio Saviano - November 14th, 2025
In Italy, over 3,000 people lose their lives on the roads every year, despite everyone knowing basic safety rules. In cybercrime, the scenario isn't all that different: millions of victims...

Did they give you a digital photo frame? It’s more than just family memories.
Redazione RHC - November 14th, 2025
Researchers have discovered several critical vulnerabilities in Uhale digital picture frames running Android , with some models even downloading and executing malware during startup. They examined the Uhale app and...

What are PsyOps? Exploring mind manipulation in the digital age.
Redazione RHC - November 14th, 2025
Psychological operations, commonly known as PsyOps, are a significant and often poorly understood element of military and security strategy . These operations involve the use of psychological tactics to influence...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

