Red Hot Cyber. The Cybersecurity Blog
Featured Articles

An increasingly aggressive campaign, directly targeting remote access infrastructure, has prompted threat actors to actively attempt to exploit vulnerabilities in Palo Alto Networks’ GlobalProtect V...

The U.S. Department of Justice has accused twin brothers Muneeb and Sohaib Akhter of deleting 96 databases containing sensitive information, including investigative records and documents requested und...

According to Eurostat, in 2023 only 55% of European Union citizens aged 16 to 74 had at least basic digital skills, with strong differences between countries: values ranging from around 83% in t...

Apple is going through a period of major leadership changes , with the departure of key figures who have contributed significantly to the company’s technological development. The latest executive to...

Cloudflare experienced a significant outage on the morning of December 5, 2025, when at 8:47 a.m. UTC, a portion of its infrastructure began experiencing internal errors. The incident, which lasted ap...
Virtual Private Network (VPN): What It Is, How It Works, and Why
Rare Earths: What They Are and Why They Matter More Than Oil in Today’s World
Let’s discover injections explained in a simple way
A journey into the world of OT/ICS: What are SCADA servers?
Quishing: What it is, how it works, and how to protect yourself
Password Managers: A Complete Guide to Choosing and Using Them

Virtual Private Network (VPN): What It Is, How It Works, and Why
Redazione RHC - November 14th, 2025
A VPN , short for Virtual Private Network, is a system that allows you to establish a secure and private connection over a public network, such as the Internet ....

Rare Earths: What They Are and Why They Matter More Than Oil in Today’s World
Redazione RHC - November 14th, 2025
We often hear about the so-called "Rare Earths". This is a set of seventeen metallic elements. These include the fifteen lanthanides on the periodic table , plus scandium and yttrium...

Let’s discover injections explained in a simple way
Davide Cavallini - November 14th, 2025
Good morning everyone. I'm Davide Cavallini, a web developer and penetration tester. Today I'm going to talk about injections. There are various types, but what does it conceptually mean to...

A journey into the world of OT/ICS: What are SCADA servers?
Redazione RHC - November 14th, 2025
The world of OT (Operational Technology) and ICS (Industrial Control Systems) is closely related to SCADA (Supervisory Control and Data Acquisition) systems. In industrial automation, SCADA systems play a fundamental...

Quishing: What it is, how it works, and how to protect yourself
Redazione RHC - November 14th, 2025
Quishing is an emerging form of cyberattack that combines traditional phishing with the use of QR codes , tools now familiar to many. The term " quishing " is a...

Password Managers: A Complete Guide to Choosing and Using Them
Redazione RHC - November 14th, 2025
Passwords: how important are they in our digital lives? How many times have we reported this on our pages? Most digital activities— from social media to banking to online shopping...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

