Red Hot Cyber. The Cybersecurity Blog
Featured Articles

It seems the White House isn’t entirely clear … at least judging by yet another change of heart regarding the sale of Nvidia’s advanced chips to China, with the Trump administration having decid...

According to a recently released report by the Financial Crimes Enforcement Network (FinCEN) , global ransomware activity peaked in 2023, only to plummet in 2024. This decline is attributed to success...

Despite significant geopolitical challenges, the mercenary spyware industry remains a resilient and persistent threat; in this context, the well-known vendor Intellexa continues to expand its arsenal....

Australia is soon to introduce groundbreaking legislation banning social media access for children under 16, an initiative that will set a precedent worldwide. A similar measure will soon be adopted i...

An increasingly aggressive campaign, directly targeting remote access infrastructure, has prompted threat actors to actively attempt to exploit vulnerabilities in Palo Alto Networks’ GlobalProtect V...
Virtual Private Network (VPN): What It Is, How It Works, and Why
Rare Earths: What They Are and Why They Matter More Than Oil in Today’s World
Let’s discover injections explained in a simple way
A journey into the world of OT/ICS: What are SCADA servers?
Quishing: What it is, how it works, and how to protect yourself
Password Managers: A Complete Guide to Choosing and Using Them

Virtual Private Network (VPN): What It Is, How It Works, and Why
Redazione RHC - November 14th, 2025
A VPN , short for Virtual Private Network, is a system that allows you to establish a secure and private connection over a public network, such as the Internet ....

Rare Earths: What They Are and Why They Matter More Than Oil in Today’s World
Redazione RHC - November 14th, 2025
We often hear about the so-called "Rare Earths". This is a set of seventeen metallic elements. These include the fifteen lanthanides on the periodic table , plus scandium and yttrium...

Let’s discover injections explained in a simple way
Davide Cavallini - November 14th, 2025
Good morning everyone. I'm Davide Cavallini, a web developer and penetration tester. Today I'm going to talk about injections. There are various types, but what does it conceptually mean to...

A journey into the world of OT/ICS: What are SCADA servers?
Redazione RHC - November 14th, 2025
The world of OT (Operational Technology) and ICS (Industrial Control Systems) is closely related to SCADA (Supervisory Control and Data Acquisition) systems. In industrial automation, SCADA systems play a fundamental...

Quishing: What it is, how it works, and how to protect yourself
Redazione RHC - November 14th, 2025
Quishing is an emerging form of cyberattack that combines traditional phishing with the use of QR codes , tools now familiar to many. The term " quishing " is a...

Password Managers: A Complete Guide to Choosing and Using Them
Redazione RHC - November 14th, 2025
Passwords: how important are they in our digital lives? How many times have we reported this on our pages? Most digital activities— from social media to banking to online shopping...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

