Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
LECS 320x100 1
Crowdstriker 970×120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Microsoft 365 Price Hike: What You Need to Know About the 2026 Increase Cybercrime

Microsoft 365 Price Hike: What You Need to Know About the 2026 Increase

Starting July 1, 2026, Microsoft 365 and Office 365 subscription prices for business and government customers will increase by 8%...
Redazione RHC - 6 December 2025
React2Shell Vulnerability Exploited by China-Linked Hackers, Patch Now Cybercrime

React2Shell Vulnerability Exploited by China-Linked Hackers, Patch Now

We often discuss on this site that the window between the publication of an exploit and the launch of active...
Redazione RHC - 6 December 2025
FreeBSD 15.0: Discover the Power of This Unix-like Operating System Cybercrime

FreeBSD 15.0: Discover the Power of This Unix-like Operating System

Behind many of the digital applications and services we take for granted every day lies a silent giant: FreeBSD ....
Redazione RHC - 6 December 2025
Cloudflare Blocks AI Bots: The Future of Internet Economy at Stake Cybercrime

Cloudflare Blocks AI Bots: The Future of Internet Economy at Stake

Since July 1st, Cloudflare has blocked 416 billion requests from artificial intelligence bots attempting to extract content from its customers'...
Redazione RHC - 5 December 2025
React2Shell Vulnerability: 8.7M Servers at Risk – CVE-2025-55182 Cybercrime

React2Shell Vulnerability: 8.7M Servers at Risk – CVE-2025-55182

In 2025, the IT and security communities are buzzing with excitement over a single name: " React2Shell ." With the...
Redazione RHC - 5 December 2025
Cloudflare Just Broke the Internet… Again. Centralization Risks Exposed Cybercrime

Cloudflare Just Broke the Internet… Again. Centralization Risks Exposed

Cloudflare is back in the spotlight after a new wave of outages that, on December 5, 2025, is affecting several...
Redazione RHC - 5 December 2025

Cloudflare goes down in the magnificent cloud! Global incident is being resolved.

November 18, 2025 - After hours of widespread disruptions , the incident affecting Cloudflare's global network finally appears to be nearing resolution. The company announced it has implemented a fix...
Share on Facebook Share on LinkedIn Share on X

Cloudflare Down: Websites and Services to Go Down on November 18, 2025

The morning of November 18, 2025, will be remembered as one of the most anomalous and widespread outages on the Cloudflare network in recent months. The CDN—the beating heart of...
Share on Facebook Share on LinkedIn Share on X

IBM AIX: Two critical bugs allow execution of arbitrary commands (Score 10 and 9.6)

Two serious vulnerabilities in IBM's AIX operating system could allow remote attackers to execute arbitrary commands on affected systems, prompting the company to issue important security updates. Both vulnerabilities represent...
Share on Facebook Share on LinkedIn Share on X

Twitter Hack: $4.1 Million Seized from 26-Year-Old Joseph James O’Connor

The story of the global Twitter hack in the summer of 2020 has had a sequel: British prosecutors have obtained the seizure of cryptocurrency mined by a key participant in...
Share on Facebook Share on LinkedIn Share on X

Shakerati Anonimi: Nicoletta’s experience and the credit card thriller

The room is the same: dim lights, chairs in a circle, thermoses of herbal teas now cold from all the talking and venting. We are Shakerati Anonimi , a group...
Share on Facebook Share on LinkedIn Share on X

Apple ordered to pay $634 million to Masimo for patent infringement

Masimo, an American company that develops medical monitoring technologies, has won another round of litigation with Apple . A federal jury awarded it $634 million for infringing a patent on...
Share on Facebook Share on LinkedIn Share on X

Microsoft Azure blocks a 15.72 terabit per second DDoS attack

A massive DDoS attack was neutralized by Microsoft Azure on October 24. A single endpoint located in Australia was targeted by the attack, which reached a maximum speed of 15.72...
Share on Facebook Share on LinkedIn Share on X

Real World and Fictional World: A Psychological and Philosophical Analysis of the 1999 Film The Matrix by Lana and Lilly Wachowski

We've said too many times that nowadays, social networks have become an integral part of our daily lives: it's now natural to contact an acquaintance with a WhatsApp message, post...
Share on Facebook Share on LinkedIn Share on X

The phenomenon of polarization on the internet: Hikikomori

Many still maintain that hikikomori is an exclusively Japanese phenomenon. Yet, scientifically, numerous studies now confirm the existence of cases similar in characteristics to Japanese hikikomori in Spain, France, Italy,...
Share on Facebook Share on LinkedIn Share on X

From Likes to Depression: How Social Media Can Affect Our Mental Health

Questioning changes as they occur is always a difficult, if not downright foolhardy, undertaking. Certainly, when the object of the investigation concerns the changes social media has wrought on individuals,...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
DevSecOps: Integrating Security into Your Development Process
Massimiliano Brolli - 07/01/2026

When it comes to application security, there’s rarely a single problem. It’s almost always a chain of small flaws, poor decisions, and missing controls that, when added together, pave the way for serious incidents. This…

Immagine del sitoCybercrime
WhatsApp Device Fingerprinting: New Measures Against Privacy Threats
Redazione RHC - 06/01/2026

WhatsApp, Meta’s messaging app with over 3 billion monthly active users, has begun introducing technical changes to mitigate several privacy vulnerabilities on user devices . The fixes, identified through independent research tools, were implemented without…

Immagine del sitoCybercrime
PS5 BootROM Key Leaked, Sony’s Security Compromised
Redazione RHC - 05/01/2026

A recent incident saw an anonymous hacker leak a crucial security key used by Sony to safeguard the integrity of the chain of trust in the PlayStation 5 console. This security key, known as the…

Immagine del sitoCybercrime
Windows 11 Performance Test: Surprising Results with Windows 8.1
Redazione RHC - 05/01/2026

A comparison test across six generations of Windows was conducted by YouTube channel TrigrZolt , which unexpectedly revealed a clear winner: Windows 8.1. Windows 11, on the other hand, performed worst in almost every test.…

Immagine del sitoCulture
Long-Lived Technologies: COBOL, C, SQL, and Legacy Systems
Redazione RHC - 02/01/2026

While the industry debates which neural network is the “smartest” and which framework is the “most modern,” decades-old technologies continue to quietly swirl beneath the surface of the banking industry . This year, COBOL turned…