Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Banner Ancharia Mobile 1
Fortinet 970x120px

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
The AGI Revolution: How Mark Gubrud’s Term Changed Tech Forever
Di Redazione RHC - 25/11/2025

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...

Immagine del sito
Anthropic Releases Claude Opus 4.5: AI Model for Enhanced Productivity
Di Redazione RHC - 24/11/2025

Anthropic has released Claude Opus 4.5 , its new flagship model, which the company says is the most powerful version yet and ranks at the top of the class for practical programming, agent-based produc...

Immagine del sito
Alibaba Qwen3Max Dominates AI Market with Rapid Growth
Di Redazione RHC - 24/11/2025

On November 24, Alibaba announced Qwen3Max, which had been in public beta for a week , and had already surpassed 10 million downloads. It was a record that shattered all others. In a very short time, ...

Immagine del sito
Digital Surveillance at Work: The Rise of Algorithmic Monitoring
Di Redazione RHC - 24/11/2025

Remote work has given employees freedom , but with it has also come digital surveillance . We discussed this some time ago in an article, reporting that these monitoring tools are also coming to Micro...

Immagine del sito
Cyberattack on Eurofiber France: Find out what happened
Di Redazione RHC - 24/11/2025

On November 13, Eurofiber France, a respected provider of fiber optic network and VPN solutions to many of France’s leading companies, discovered that its systems had been compromised by criminal ha...

The dark web isn’t selling your data. You’re the one putting it up for sale every day!

Unfortunately, personal data is a highly attractive and valuable market for cybercriminals, for reasons that are not at all difficult to imagine . We'...
Stefano Gazzella - 12/11/2025 - 07:09

Attack Techniques: What is a Command and Control (C2) Server?

Among the many strategies used by attackers, one of the most insidious is represented by Command and Control (C2) Servers. We often discuss them on th...
Redazione RHC - 11/11/2025 - 22:55

New Penetration Testing Methods: Adversary Emulation and the Importance of a Non-Technological Approach to Corporate Security

In the ever-evolving digital world, cybersecurity threats are becoming increasingly sophisticated and pervasive. Companies in every industry face a gr...
Sandro Sana - 11/11/2025 - 22:48

Cyber Incident Mitigation Guide: The First Steps

By definition, a security incident occurs when a computer system, network, or the data contained within them is compromised, breached, or damaged by m...
Ricardo Nardini - 11/11/2025 - 22:28

Let’s find out what cyber insurance is. It insures your online business, but not only that.

The digital world is constantly evolving, and with the growth of online activity, protecting your business from potential cyber threats has become inc...
Redazione RHC - 11/11/2025 - 22:15

Let’s find out what Business Impact Analysis (BIA) is

Business Impact Analysis (BIA) is a fundamental tool for ensuring business continuity. BIA helps organizations identify activities critical to their o...
Redazione RHC - 11/11/2025 - 21:52
1 22 23 24 25 26 254

The dark web isn’t selling your data. You’re the one putting it up for sale every day!

- November 12th, 2025

Unfortunately, personal data is a highly attractive and valuable market for cybercriminals, for reasons that are not at all difficult to imagine . We're not just talking about scams or...

Facebook Linkedin X

Attack Techniques: What is a Command and Control (C2) Server?

- November 11th, 2025

Among the many strategies used by attackers, one of the most insidious is represented by Command and Control (C2) Servers. We often discuss them on the pages of RHC, but...

Facebook Linkedin X

New Penetration Testing Methods: Adversary Emulation and the Importance of a Non-Technological Approach to Corporate Security

- November 11th, 2025

In the ever-evolving digital world, cybersecurity threats are becoming increasingly sophisticated and pervasive. Companies in every industry face a growing challenge in protecting their sensitive data and customer information. In...

Facebook Linkedin X

Cyber Incident Mitigation Guide: The First Steps

- November 11th, 2025

By definition, a security incident occurs when a computer system, network, or the data contained within them is compromised, breached, or damaged by malicious or unauthorized activity. These incidents can...

Facebook Linkedin X

Let’s find out what cyber insurance is. It insures your online business, but not only that.

- November 11th, 2025

The digital world is constantly evolving, and with the growth of online activity, protecting your business from potential cyber threats has become increasingly important. Cyber insurance is a form of...

Facebook Linkedin X

Let’s find out what Business Impact Analysis (BIA) is

- November 11th, 2025

Business Impact Analysis (BIA) is a fundamental tool for ensuring business continuity. BIA helps organizations identify activities critical to their operations, the risks associated with those activities, and the impacts...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE