Red Hot Cyber. The Cybersecurity Blog
Featured Articles

Apple is going through a period of major leadership changes , with the departure of key figures who have contributed significantly to the company’s technological development. The latest executive to...

Cloudflare experienced a significant outage on the morning of December 5, 2025, when at 8:47 a.m. UTC, a portion of its infrastructure began experiencing internal errors. The incident, which lasted ap...

A critical vulnerability has been published in Apache Tika that could allow an XML external entity injection attack, known as XXE . The vulnerability, classified as CVE-2025-66516, has a CVE severity ...

A spokesperson for the Chinese Embassy in Canada responded to a reporter’s question about the outcry in Canada over so-called “Chinese cyber attacks.” A reporter asked : Recently, the Canadian C...

Starting July 1, 2026, Microsoft 365 and Office 365 subscription prices for business and government customers will increase by 8% to 33% , depending on the plan. This price adjustment will apply to bo...
Discovering the NIS2 Directive: Security and Resilience of Digital Systems in the European Union
Kraken Arrives: The New Ransomware That Assesses Your Environment to Inflict Maximum Damage
North Korea reorganizes its intelligence with a new agency
Cognitive Biases and Cybersecurity: The Fatal Fallacy of “I Have Nothing to Hide”
Did they give you a digital photo frame? It’s more than just family memories.
What are PsyOps? Exploring mind manipulation in the digital age.

Discovering the NIS2 Directive: Security and Resilience of Digital Systems in the European Union
Riccardo Nuti - November 14th, 2025
On 10 November 2022, the European Parliament, by a large majority, approved the NIS2 (Network and Information System Security) Directive with its publication in the Official Journal of the European...

Kraken Arrives: The New Ransomware That Assesses Your Environment to Inflict Maximum Damage
Redazione RHC - November 14th, 2025
Cisco Talos researchers have detected an active wave of attacks using a new ransomware called Kraken. The group began operating in February 2025 and uses double-extortion methods, without targeting specific...

North Korea reorganizes its intelligence with a new agency
Redazione RHC - November 14th, 2025
North Korea has restructured its intelligence hierarchy, transforming the former Intelligence Agency into a structure with a much broader mandate. The new body, called the General Intelligence Directorate (GIRD), brings...

Cognitive Biases and Cybersecurity: The Fatal Fallacy of “I Have Nothing to Hide”
Fabrizio Saviano - November 14th, 2025
In Italy, over 3,000 people lose their lives on the roads every year, despite everyone knowing basic safety rules. In cybercrime, the scenario isn't all that different: millions of victims...

Did they give you a digital photo frame? It’s more than just family memories.
Redazione RHC - November 14th, 2025
Researchers have discovered several critical vulnerabilities in Uhale digital picture frames running Android , with some models even downloading and executing malware during startup. They examined the Uhale app and...

What are PsyOps? Exploring mind manipulation in the digital age.
Redazione RHC - November 14th, 2025
Psychological operations, commonly known as PsyOps, are a significant and often poorly understood element of military and security strategy . These operations involve the use of psychological tactics to influence...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

