Red Hot Cyber. The Cybersecurity Blog
Featured Articles

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...

Anthropic has released Claude Opus 4.5 , its new flagship model, which the company says is the most powerful version yet and ranks at the top of the class for practical programming, agent-based produc...
New Penetration Testing Methods: Adversary Emulation and the Importance of a Non-Technological Approach to Corporate Security
Cyber Incident Mitigation Guide: The First Steps
Let’s find out what cyber insurance is. It insures your online business, but not only that.
Let’s find out what Business Impact Analysis (BIA) is
What is risk analysis in ICT Risk Management?
What is Web Scraping? Let’s Understand It Better

New Penetration Testing Methods: Adversary Emulation and the Importance of a Non-Technological Approach to Corporate Security
Sandro Sana - November 11th, 2025
In the ever-evolving digital world, cybersecurity threats are becoming increasingly sophisticated and pervasive. Companies in every industry face a growing challenge in protecting their sensitive data and customer information. In...

Cyber Incident Mitigation Guide: The First Steps
Ricardo Nardini - November 11th, 2025
By definition, a security incident occurs when a computer system, network, or the data contained within them is compromised, breached, or damaged by malicious or unauthorized activity. These incidents can...

Let’s find out what cyber insurance is. It insures your online business, but not only that.
Redazione RHC - November 11th, 2025
The digital world is constantly evolving, and with the growth of online activity, protecting your business from potential cyber threats has become increasingly important. Cyber insurance is a form of...

Let’s find out what Business Impact Analysis (BIA) is
Redazione RHC - November 11th, 2025
Business Impact Analysis (BIA) is a fundamental tool for ensuring business continuity. BIA helps organizations identify activities critical to their operations, the risks associated with those activities, and the impacts...

What is risk analysis in ICT Risk Management?
Redazione RHC - November 11th, 2025
Risk analysis is an important process in the context of ICT Risk Management as it allows us to evaluate the effectiveness of the technical countermeasures adopted to mitigate ICT risks....

What is Web Scraping? Let’s Understand It Better
Redazione RHC - November 11th, 2025
We have often talked about huge user databases being sold on underground forums and said that this was web scraping. In April 2021, Facebook lost 533 million users , while...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

