Welcome to Red Hot Cyber | Cybersecurity News
Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Redhotcyber Banner Sito 320x100px Uscita 101125
Crowdstriker 970×120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
US Allows Nvidia to Sell Advanced AI Chips to China, Easing Export Restrictions
Di Redazione RHC - 09/12/2025

It seems the White House isn’t entirely clear … at least judging by yet another change of heart regarding the sale of Nvidia’s advanced chips to China, with the Trump administration having decid...

Immagine del sito
Ransomware Attacks Decline in 2024, But Threat Remains High with $734M in Ransom
Di Redazione RHC - 09/12/2025

According to a recently released report by the Financial Crimes Enforcement Network (FinCEN) , global ransomware activity peaked in 2023, only to plummet in 2024. This decline is attributed to success...

Immagine del sito
Intellexa Exploits Zero-Day Vulnerabilities with Spyware
Di Redazione RHC - 08/12/2025

Despite significant geopolitical challenges, the mercenary spyware industry remains a resilient and persistent threat; in this context, the well-known vendor Intellexa continues to expand its arsenal....

Immagine del sito
Australia Bans Social Media for Under 16s: What You Need to Know
Di Redazione RHC - 08/12/2025

Australia is soon to introduce groundbreaking legislation banning social media access for children under 16, an initiative that will set a precedent worldwide. A similar measure will soon be adopted i...

Immagine del sito
Palo Alto Networks VPN Vulnerability Exploited by Hackers
Di Redazione RHC - 08/12/2025

An increasingly aggressive campaign, directly targeting remote access infrastructure, has prompted threat actors to actively attempt to exploit vulnerabilities in Palo Alto Networks’ GlobalProtect V...

Understanding Firewalls: The First Line of Defense in Cybersecurity

In the world of cybersecurity, firewalls are the first line of defense against cyber threats and attacks. Every day, businesses and home users are exp...
Redazione RHC - 15/11/2025 - 11:03

Critical Vulnerability in FortiWeb: Fortinet and CISA Recommend Urgent Updates

Fortinet has confirmed the discovery of a critical relative path vulnerability (CWE-23) in FortiWeb devices, identified as CVE-2025-64446 and register...
Redazione RHC - 15/11/2025 - 10:54

China’s New Era of Robots: Shenzhen at the Center of the Technological Revolution

The 15th Chinese National Games opened with a spectacle that combined sport and technology. Among the highlights were robots capable of playing ancien...
Redazione RHC - 15/11/2025 - 10:33

IndonesianFoods: The Worm That’s Wreaking Havoc on npm and Created 100,000 Packages

A self-propagating worm, named IndonesianFoods , has been discovered in npm . It generates new packets every seven seconds. According to Sonatype, the...
Redazione RHC - 15/11/2025 - 08:43

Vibe-Hacking: The New Frontier of Criminal Cybersecurity

The cybersecurity landscape has accustomed us to constant upheavals. Every year new threats, new scenarios, and new criminal tactics emerge. But today...
Andrea Fellegara - 15/11/2025 - 08:27

Two-Factor Authentication and MFA: Protect Your Accounts in 3 Easy Steps!

Two-factor authentication (2FA) , or more commonly, Multi-Factor Authentication (MFA) , is an effective solution for protecting our online accounts. W...
Redazione RHC - 14/11/2025 - 22:47
1 32 33 34 35 36 273

Understanding Firewalls: The First Line of Defense in Cybersecurity

- November 14th, 2025

In the world of cybersecurity, firewalls are the first line of defense against cyber threats and attacks. Every day, businesses and home users are exposed to risks such as malware,...

Facebook Linkedin X

Critical Vulnerability in FortiWeb: Fortinet and CISA Recommend Urgent Updates

- November 14th, 2025

Fortinet has confirmed the discovery of a critical relative path vulnerability (CWE-23) in FortiWeb devices, identified as CVE-2025-64446 and registered as IR Number FG-IR-25-910 . The flaw, published on November...

Facebook Linkedin X

China’s New Era of Robots: Shenzhen at the Center of the Technological Revolution

- November 14th, 2025

The 15th Chinese National Games opened with a spectacle that combined sport and technology. Among the highlights were robots capable of playing ancient bronze instruments, artificial intelligence systems capable of...

Facebook Linkedin X

IndonesianFoods: The Worm That’s Wreaking Havoc on npm and Created 100,000 Packages

- November 14th, 2025

A self-propagating worm, named IndonesianFoods , has been discovered in npm . It generates new packets every seven seconds. According to Sonatype, the malware has already created over 100,000 packets...

Facebook Linkedin X

Vibe-Hacking: The New Frontier of Criminal Cybersecurity

- November 14th, 2025

The cybersecurity landscape has accustomed us to constant upheavals. Every year new threats, new scenarios, and new criminal tactics emerge. But today, it's not just technology that's redefining the rules...

Facebook Linkedin X

Two-Factor Authentication and MFA: Protect Your Accounts in 3 Easy Steps!

- November 13th, 2025

Two-factor authentication (2FA) , or more commonly, Multi-Factor Authentication (MFA) , is an effective solution for protecting our online accounts. With the rise of cyberattacks and identity theft, it's crucial...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE