Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Redhotcyber Banner Sito 970x120px Uscita 101125
Precedente Successivo

Latest news

CyberVolk Ransomware Flawed: Free File Recovery Possible Cyber News

CyberVolk Ransomware Flawed: Free File Recovery Possible

This isn't the first time criminal hackers make mistakes, and it won't be the last. The pro-Russian hacktivist group CyberVolk...
Massimiliano Brolli - December 17, 2025
The Psychology of Passwords: Why Weak Passwords Persist Cybercrime

The Psychology of Passwords: Why Weak Passwords Persist

The psychology of passwords starts right here: trying to understand people before systems. Welcome to "The Mind Behind Passwords," the...
Simone D'Agostino - December 17, 2025
Russian Cyber Operations Shift to Targeting Western Critical Infrastructure Cyber News

Russian Cyber Operations Shift to Targeting Western Critical Infrastructure

New details emerge from an Amazon Threat Intelligence report that highlight an alarming shift in Russian government-backed cyber operations. High-level...
Redazione RHC - December 17, 2025
AI Smart Glasses for Police: Efficient Vehicle Checks in China Cyber News

AI Smart Glasses for Police: Efficient Vehicle Checks in China

The Changsha traffic police have begun using AI-powered smart glasses in their daily patrols. This was confirmed by the city's...
Redazione RHC - December 17, 2025
Notepad++ 8.8.9 Released: Fixing Critical Update Vulnerability Cyber News

Notepad++ 8.8.9 Released: Fixing Critical Update Vulnerability

A new version, 8.8.9, of the popular text editor Notepad++, has been released by its developers, fixing a flaw in...
Massimiliano Brolli - December 16, 2025
Salt Typhoon Hackers Exposed: Cisco Training Led to Global Telecom Breaches Cyber News

Salt Typhoon Hackers Exposed: Cisco Training Led to Global Telecom Breaches

A recent study by SentinelLabs sheds new light on the roots of the hacker group known as “Salt Typhoon ,”...
Agostino Pellegrino - December 16, 2025

Real World and Fictional World: A Psychological and Philosophical Analysis of the 1999 Film The Matrix by Lana and Lilly Wachowski

We've said too many times that nowadays, social networks have become an integral part of our daily lives: it's now natural to contact an acquaintance with a WhatsApp message, post...

The phenomenon of polarization on the internet: Hikikomori

Many still maintain that hikikomori is an exclusively Japanese phenomenon. Yet, scientifically, numerous studies now confirm the existence of cases similar in characteristics to Japanese hikikomori in Spain, France, Italy,...

From Likes to Depression: How Social Media Can Affect Our Mental Health

Questioning changes as they occur is always a difficult, if not downright foolhardy, undertaking. Certainly, when the object of the investigation concerns the changes social media has wrought on individuals,...

The US and Global Surveillance: Uncovering Section 702 of the Foreign Intelligence Surveillance Act

Privacy in the United States is a constant topic of debate, especially in the digital age. The Supreme Court has played a central role in interpreting the Fourth Amendment, which...

What is Cross-Site Scripting? An article to help you understand it in a simple way.

Author : Davide Cavallini Today I will try to use the same dialectic ( as previously done in the article on SQL injection ), and explain in a simple way...

Spy Apps: How Spyware Works and Why It’s a Privacy Risk

Spyware (also known as spy apps) represent one of the most insidious and dangerous threats of the digital age. These are malicious programs designed to infiltrate a user's device, collecting...

Nuclear power entirely in the hands of AI! And what if there’s an accident?

In the technological field, the idea that the future development of generating systems depends inexorably on the expansion of nuclear capacity is taking root, pushing the sector's players to identify...

Veeam Analysis: Ransomware Payments Decline, But Data Resilience Remains Critical for EMEA Enterprises

Beyond backup: Businesses need cyber resilience, data portability, secure cloud storage, and hybrid cloud protection . Data from the Veeam Ransomware Trends Reports 2024 and 2025 shows that the number...

The History of GPS: The History of Satellite Navigation

It's amazing how far we've come with satellite navigation in the last 40 years. GPS (Global Positioning System) is one of the most useful things to have ever come out...

16 Years of Go: An Innovative and Scalable Programming Language

In November 2025, the Go programming language turned 16 years old. It was released publicly on November 10, 2009 , as a Google experiment to create a simple and fast...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE