Red Hot Cyber. The Cybersecurity Blog
Featured Articles

According to Eurostat, in 2023 only 55% of European Union citizens aged 16 to 74 had at least basic digital skills, with strong differences between countries: values ranging from around 83% in t...

Apple is going through a period of major leadership changes , with the departure of key figures who have contributed significantly to the company’s technological development. The latest executive to...

Cloudflare experienced a significant outage on the morning of December 5, 2025, when at 8:47 a.m. UTC, a portion of its infrastructure began experiencing internal errors. The incident, which lasted ap...

A critical vulnerability has been published in Apache Tika that could allow an XML external entity injection attack, known as XXE . The vulnerability, classified as CVE-2025-66516, has a CVE severity ...

A spokesperson for the Chinese Embassy in Canada responded to a reporter’s question about the outcry in Canada over so-called “Chinese cyber attacks.” A reporter asked : Recently, the Canadian C...
Let’s discover injections explained in a simple way
A journey into the world of OT/ICS: What are SCADA servers?
Quishing: What it is, how it works, and how to protect yourself
Password Managers: A Complete Guide to Choosing and Using Them
Discovering the NIS2 Directive: Security and Resilience of Digital Systems in the European Union
Kraken Arrives: The New Ransomware That Assesses Your Environment to Inflict Maximum Damage

Let’s discover injections explained in a simple way
Davide Cavallini - November 14th, 2025
Good morning everyone. I'm Davide Cavallini, a web developer and penetration tester. Today I'm going to talk about injections. There are various types, but what does it conceptually mean to...

A journey into the world of OT/ICS: What are SCADA servers?
Redazione RHC - November 14th, 2025
The world of OT (Operational Technology) and ICS (Industrial Control Systems) is closely related to SCADA (Supervisory Control and Data Acquisition) systems. In industrial automation, SCADA systems play a fundamental...

Quishing: What it is, how it works, and how to protect yourself
Redazione RHC - November 14th, 2025
Quishing is an emerging form of cyberattack that combines traditional phishing with the use of QR codes , tools now familiar to many. The term " quishing " is a...

Password Managers: A Complete Guide to Choosing and Using Them
Redazione RHC - November 14th, 2025
Passwords: how important are they in our digital lives? How many times have we reported this on our pages? Most digital activities— from social media to banking to online shopping...

Discovering the NIS2 Directive: Security and Resilience of Digital Systems in the European Union
Riccardo Nuti - November 14th, 2025
On 10 November 2022, the European Parliament, by a large majority, approved the NIS2 (Network and Information System Security) Directive with its publication in the Official Journal of the European...

Kraken Arrives: The New Ransomware That Assesses Your Environment to Inflict Maximum Damage
Redazione RHC - November 14th, 2025
Cisco Talos researchers have detected an active wave of attacks using a new ransomware called Kraken. The group began operating in February 2025 and uses double-extortion methods, without targeting specific...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

