Red Hot Cyber. The Cybersecurity Blog
Featured Articles

Gartner analysts have urged businesses to temporarily stop using browsers with built-in artificial intelligence (AI) capabilities . In a recent advisory, the company emphasizes that such tools pose un...

A critical vulnerability affecting the FortiOS, FortiWeb, FortiProxy , and FortiSwitchManager product lines has been reported by Fortinet via an urgent security advisory. This advisory was issued in c...

It seems the White House isn’t entirely clear … at least judging by yet another change of heart regarding the sale of Nvidia’s advanced chips to China, with the Trump administration having decid...

According to a recently released report by the Financial Crimes Enforcement Network (FinCEN) , global ransomware activity peaked in 2023, only to plummet in 2024. This decline is attributed to success...

Despite significant geopolitical challenges, the mercenary spyware industry remains a resilient and persistent threat; in this context, the well-known vendor Intellexa continues to expand its arsenal....
Real World and Fictional World: A Psychological and Philosophical Analysis of the 1999 Film The Matrix by Lana and Lilly Wachowski
The phenomenon of polarization on the internet: Hikikomori
From Likes to Depression: How Social Media Can Affect Our Mental Health
The US and Global Surveillance: Uncovering Section 702 of the Foreign Intelligence Surveillance Act
What is Cross-Site Scripting? An article to help you understand it in a simple way.
Spy Apps: How Spyware Works and Why It’s a Privacy Risk

Real World and Fictional World: A Psychological and Philosophical Analysis of the 1999 Film The Matrix by Lana and Lilly Wachowski
Daniela Farina - November 16th, 2025
We've said too many times that nowadays, social networks have become an integral part of our daily lives: it's now natural to contact an acquaintance with a WhatsApp message, post...

The phenomenon of polarization on the internet: Hikikomori
Daniela Farina - November 16th, 2025
Many still maintain that hikikomori is an exclusively Japanese phenomenon. Yet, scientifically, numerous studies now confirm the existence of cases similar in characteristics to Japanese hikikomori in Spain, France, Italy,...

From Likes to Depression: How Social Media Can Affect Our Mental Health
Daniela Farina - November 16th, 2025
Questioning changes as they occur is always a difficult, if not downright foolhardy, undertaking. Certainly, when the object of the investigation concerns the changes social media has wrought on individuals,...

The US and Global Surveillance: Uncovering Section 702 of the Foreign Intelligence Surveillance Act
Aniello Giugliano - November 16th, 2025
Privacy in the United States is a constant topic of debate, especially in the digital age. The Supreme Court has played a central role in interpreting the Fourth Amendment, which...

What is Cross-Site Scripting? An article to help you understand it in a simple way.
Davide Cavallini - November 16th, 2025
Author : Davide Cavallini Today I will try to use the same dialectic ( as previously done in the article on SQL injection ), and explain in a simple way...

Spy Apps: How Spyware Works and Why It’s a Privacy Risk
Redazione RHC - November 16th, 2025
Spyware (also known as spy apps) represent one of the most insidious and dangerous threats of the digital age. These are malicious programs designed to infiltrate a user's device, collecting...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

