Welcome to Red Hot Cyber | Cybersecurity News
Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Banner Mobile
Crowdstriker 970×120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Intellexa Exploits Zero-Day Vulnerabilities with Spyware
Di Redazione RHC - 08/12/2025

Despite significant geopolitical challenges, the mercenary spyware industry remains a resilient and persistent threat; in this context, the well-known vendor Intellexa continues to expand its arsenal....

Immagine del sito
Australia Bans Social Media for Under 16s: What You Need to Know
Di Redazione RHC - 08/12/2025

Australia is soon to introduce groundbreaking legislation banning social media access for children under 16, an initiative that will set a precedent worldwide. A similar measure will soon be adopted i...

Immagine del sito
Palo Alto Networks VPN Vulnerability Exploited by Hackers
Di Redazione RHC - 08/12/2025

An increasingly aggressive campaign, directly targeting remote access infrastructure, has prompted threat actors to actively attempt to exploit vulnerabilities in Palo Alto Networks’ GlobalProtect V...

Immagine del sito
US Brothers Accused of Destroying 96 Databases with AI
Di Redazione RHC - 08/12/2025

The U.S. Department of Justice has accused twin brothers Muneeb and Sohaib Akhter of deleting 96 databases containing sensitive information, including investigative records and documents requested und...

Immagine del sito
Digital Literacy in Schools: The Key to Unlocking Students’ Potential
Di Inva Malaj - 08/12/2025

According to Eurostat, in 2023 only 55% of European Union citizens aged 16 to 74 had at least basic digital skills, with strong differences between countries: values ​​ranging from around 83% in t...

Cognitive Biases and Cybersecurity: The Fatal Fallacy of “I Have Nothing to Hide”

In Italy, over 3,000 people lose their lives on the roads every year, despite everyone knowing basic safety rules. In cybercrime, the scenario isn't a...
Fabrizio Saviano - 15/11/2025 - 12:39

Did they give you a digital photo frame? It’s more than just family memories.

Researchers have discovered several critical vulnerabilities in Uhale digital picture frames running Android , with some models even downloading and e...
Redazione RHC - 15/11/2025 - 12:38

What are PsyOps? Exploring mind manipulation in the digital age.

Psychological operations, commonly known as PsyOps, are a significant and often poorly understood element of military and security strategy . These op...
Redazione RHC - 15/11/2025 - 11:10

Understanding Firewalls: The First Line of Defense in Cybersecurity

In the world of cybersecurity, firewalls are the first line of defense against cyber threats and attacks. Every day, businesses and home users are exp...
Redazione RHC - 15/11/2025 - 11:03

Critical Vulnerability in FortiWeb: Fortinet and CISA Recommend Urgent Updates

Fortinet has confirmed the discovery of a critical relative path vulnerability (CWE-23) in FortiWeb devices, identified as CVE-2025-64446 and register...
Redazione RHC - 15/11/2025 - 10:54

China’s New Era of Robots: Shenzhen at the Center of the Technological Revolution

The 15th Chinese National Games opened with a spectacle that combined sport and technology. Among the highlights were robots capable of playing ancien...
Redazione RHC - 15/11/2025 - 10:33
1 30 31 32 33 34 271

Cognitive Biases and Cybersecurity: The Fatal Fallacy of “I Have Nothing to Hide”

- November 14th, 2025

In Italy, over 3,000 people lose their lives on the roads every year, despite everyone knowing basic safety rules. In cybercrime, the scenario isn't all that different: millions of victims...

Facebook Linkedin X

Did they give you a digital photo frame? It’s more than just family memories.

- November 14th, 2025

Researchers have discovered several critical vulnerabilities in Uhale digital picture frames running Android , with some models even downloading and executing malware during startup. They examined the Uhale app and...

Facebook Linkedin X

What are PsyOps? Exploring mind manipulation in the digital age.

- November 14th, 2025

Psychological operations, commonly known as PsyOps, are a significant and often poorly understood element of military and security strategy . These operations involve the use of psychological tactics to influence...

Facebook Linkedin X

Understanding Firewalls: The First Line of Defense in Cybersecurity

- November 14th, 2025

In the world of cybersecurity, firewalls are the first line of defense against cyber threats and attacks. Every day, businesses and home users are exposed to risks such as malware,...

Facebook Linkedin X

Critical Vulnerability in FortiWeb: Fortinet and CISA Recommend Urgent Updates

- November 14th, 2025

Fortinet has confirmed the discovery of a critical relative path vulnerability (CWE-23) in FortiWeb devices, identified as CVE-2025-64446 and registered as IR Number FG-IR-25-910 . The flaw, published on November...

Facebook Linkedin X

China’s New Era of Robots: Shenzhen at the Center of the Technological Revolution

- November 14th, 2025

The 15th Chinese National Games opened with a spectacle that combined sport and technology. Among the highlights were robots capable of playing ancient bronze instruments, artificial intelligence systems capable of...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE