Red Hot Cyber. The Cybersecurity Blog
Featured Articles

Starting July 1, 2026, Microsoft 365 and Office 365 subscription prices for business and government customers will increase by 8% to 33% , depending on the plan. This price adjustment will apply to bo...

In 2025, the IT and security communities are buzzing with excitement over a single name: ” React2Shell .” With the disclosure of a new vulnerability, CVE-2025-55182, classified as CVSS 10.0, devel...

Cloudflare is back in the spotlight after a new wave of outages that, on December 5, 2025, is affecting several components of the platform. In addition to the Dashboard and API issues already reported...

Security researchers have discovered two high-risk vulnerabilities (CVE-2025-20386 and CVE-2025-20387, with CVSS severity 8.0) affecting the Splunk Enterprise platform and Universal Forwarder componen...

The Apache Software Foundation has released a significant update for its popular Apache HTTP Server , addressing a total of five separate security vulnerabilities. Administrators are recommended to ap...
Microsoft Azure blocks a 15.72 terabit per second DDoS attack
Real World and Fictional World: A Psychological and Philosophical Analysis of the 1999 Film The Matrix by Lana and Lilly Wachowski
The phenomenon of polarization on the internet: Hikikomori
From Likes to Depression: How Social Media Can Affect Our Mental Health
The US and Global Surveillance: Uncovering Section 702 of the Foreign Intelligence Surveillance Act
What is Cross-Site Scripting? An article to help you understand it in a simple way.

Microsoft Azure blocks a 15.72 terabit per second DDoS attack
Redazione RHC - November 17th, 2025
A massive DDoS attack was neutralized by Microsoft Azure on October 24. A single endpoint located in Australia was targeted by the attack, which reached a maximum speed of 15.72...

Real World and Fictional World: A Psychological and Philosophical Analysis of the 1999 Film The Matrix by Lana and Lilly Wachowski
Daniela Farina - November 16th, 2025
We've said too many times that nowadays, social networks have become an integral part of our daily lives: it's now natural to contact an acquaintance with a WhatsApp message, post...

The phenomenon of polarization on the internet: Hikikomori
Daniela Farina - November 16th, 2025
Many still maintain that hikikomori is an exclusively Japanese phenomenon. Yet, scientifically, numerous studies now confirm the existence of cases similar in characteristics to Japanese hikikomori in Spain, France, Italy,...

From Likes to Depression: How Social Media Can Affect Our Mental Health
Daniela Farina - November 16th, 2025
Questioning changes as they occur is always a difficult, if not downright foolhardy, undertaking. Certainly, when the object of the investigation concerns the changes social media has wrought on individuals,...

The US and Global Surveillance: Uncovering Section 702 of the Foreign Intelligence Surveillance Act
Aniello Giugliano - November 16th, 2025
Privacy in the United States is a constant topic of debate, especially in the digital age. The Supreme Court has played a central role in interpreting the Fourth Amendment, which...

What is Cross-Site Scripting? An article to help you understand it in a simple way.
Davide Cavallini - November 16th, 2025
Author : Davide Cavallini Today I will try to use the same dialectic ( as previously done in the article on SQL injection ), and explain in a simple way...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

