Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Enterprise BusinessLog 320x200 1
UtiliaCS 970x120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Digital Literacy in Schools: The Key to Unlocking Students’ Potential Cybercrime

Digital Literacy in Schools: The Key to Unlocking Students’ Potential

According to Eurostat, in 2023 only 55% of European Union citizens aged 16 to 74 had at least basic digital...
Inva Malaj - 8 December 2025
OSINT Investigation: Uncovering Digital Evidence Cybercrime

OSINT Investigation: Uncovering Digital Evidence

We live in an age of almost mandatory transparency, an age in which every single digital action we take, be...
Alexandro Irace - 8 December 2025
Europe’s Digital Sovereignty: The Risks of Relying on Non-European Tech Cybercrime

Europe’s Digital Sovereignty: The Risks of Relying on Non-European Tech

In recent months, two seemingly unrelated events have highlighted an uncomfortable truth: Europe no longer controls its own digital infrastructure...
Redazione RHC - 7 December 2025
Apple’s Major Shake-Up: Johny Srouji Leaves as Senior VP of Hardware Technologies Cybercrime

Apple’s Major Shake-Up: Johny Srouji Leaves as Senior VP of Hardware Technologies

Apple is going through a period of major leadership changes , with the departure of key figures who have contributed...
Redazione RHC - 7 December 2025
Cloudflare Outage: 25 Minutes of Chaos Due to React Server Issue Cybercrime

Cloudflare Outage: 25 Minutes of Chaos Due to React Server Issue

Cloudflare experienced a significant outage on the morning of December 5, 2025, when at 8:47 a.m. UTC, a portion of...
Redazione RHC - 7 December 2025
Microsoft CEO on AI Challenges Cybercrime

Microsoft CEO on AI Challenges

In a conversation with Matthias Döpfner, CEO of Axel Springer, Microsoft CEO Satya Nadella acknowledged that the Redmond-based company's impressive...
Redazione RHC - 7 December 2025

Hundreds of robots on the march: China presents the new generation of humanoids

Shenzhen -based UBTECH Robotics has publicly demonstrated its new wave of humanoid robots, delivering several hundred of them in a single shipment. The announcement was accompanied by a video that...
Share on Facebook Share on LinkedIn Share on X

Veeam launches Data Platform v13, redefining the standard for cyber resilience and advanced data protection.

With new capabilities to stay ahead of threats and accelerate recovery with next-generation security, forensic insights and intelligent automation, Veeam also launches the Universal Hypervisor Integration API, a flexible integration...
Share on Facebook Share on LinkedIn Share on X

Happy birthday, Windows! 40 years of operating system history and still going strong.

Exactly 40 years ago, on November 20, 1985, Microsoft released Windows 1.0 , the first version of Windows, which attempted to transform the then-personal computer from a machine with a...
Share on Facebook Share on LinkedIn Share on X

World Children’s Day: Children live in digital, but digital wasn’t designed for them.

Today is World Children's Day, established by the UN on November 20 to commemorate two fundamental acts: the 1959 Declaration of the Rights of the Child and, thirty years later,...
Share on Facebook Share on LinkedIn Share on X

Huawei unveils HarmonyOS and the new HM740 laptop. Is Microsoft Office at risk?

On November 19, Huawei presented the latest developments in its HarmonyOS line for the office sector during a technical meeting with institutional partners and enterprises. The company confirmed that HarmonyOS-based...
Share on Facebook Share on LinkedIn Share on X

Meta and Google suspend construction of two undersea cables due to instability in the Red Sea

Meta and Google have been forced to postpone several major undersea internet cable projects, including 2Africa and Blue-Raman , in the Red Sea corridor through which 20 percent of global...
Share on Facebook Share on LinkedIn Share on X

Let the hunt begin! Critical 7-Zip bug puts millions of users at risk.

Millions of users are exposed to the risk of malware infections and system compromise due to hackers' active exploitation of a critical remote code execution (RCE) vulnerability in the popular...
Share on Facebook Share on LinkedIn Share on X

Python to Rust: A More Secure Future for the Programming Language

Two CPython developers have proposed adding the Rust programming language to the Python codebase . Emma Smith and a colleague have published a Preliminary Python Enhancement Proposal (Pre-PEP) justifying this...
Share on Facebook Share on LinkedIn Share on X

Multi-threaded Hacking: US Pioneers Automated Operations with AI Agents

In recent months, a new cyber operations infrastructure has been developing in the United States, in which automated agents are becoming not just a support tool, but a full-fledged participant...
Share on Facebook Share on LinkedIn Share on X

WhatsApp data leak: 3.5 billion numbers “stolen” by researchers at the University of Vienna

The scale of the leak, described by a team from the University of Vienna , demonstrates how dangerous the familiar contact search function of popular messaging apps can be. WhatsApp...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Iran Protests Escalate as Reza Pahlavi Calls for Action Against Government
Redazione RHC - 09/01/2026

Iranian protesters chanted and marched through the streets until Friday morning, following a call from exiled former Prince Reza Pahlavi to demonstrate, despite the Iranian theocracy cutting off the country from the internet and international…

Immagine del sitoCybercrime
Veeam Backup Vulnerability: Critical RCE Flaw Discovered – Update Now
Redazione RHC - 08/01/2026

Backups are generally considered the last line of defense, but this week Veeam reminded us that backup systems themselves can become entry points for attacks. The company released security updates for Backup & Replication ,…

Immagine del sitoCybercrime
When Attack Discovery Becomes Automated, Detection Stops Scaling
Alexander Rogan - 08/01/2026

For much of the past two decades, cybersecurity has been built on a simple assumption: malicious activity can be detected, analysed, and responded to before meaningful damage occurs. This assumption shaped everything from SOC design…

Immagine del sitoCybercrime
CVE-2026-21858: n8n Vulnerability Exposes Thousands of Servers to RCE
Redazione RHC - 08/01/2026

The vulnerability, identified as CVE-2026-21858, which we recently reported on, affects approximately 100,000 servers worldwide, threatening to expose proprietary API keys, customer databases, and AI workflows. The vulnerability, with a CVSS score of 10, has…

Immagine del sitoCybercrime
Disable Windows 11 AI Features Easily with RemoveWindowsAI Tool
Redazione RHC - 07/01/2026

A new open-source script allows Windows 11 users to widely disable the operating system’s built-in artificial intelligence features . The project, developed by Zoicware , is called RemoveWindowsAI and aims to offer greater control over…