Welcome to Red Hot Cyber | Cybersecurity News
Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
LECS 320x100 1
TM RedHotCyber 970x120 042543

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Alibaba Qwen3Max Dominates AI Market with Rapid Growth

On November 24, Alibaba announced Qwen3Max, which had been in public beta for a week , and had already surpassed...
Redazione RHC - 24 November 2025

Digital Surveillance at Work: The Rise of Algorithmic Monitoring

Remote work has given employees freedom , but with it has also come digital surveillance . We discussed this some...
Redazione RHC - 24 November 2025

Windows Server Vulnerability Exploited: ShadowPad Malware Deployed

A recently patched vulnerability in Microsoft’s Windows Server update services has led to a series of attacks using one of...
Redazione RHC - 24 November 2025

Salesforce Data Breach: ShinyHunters Hack Gainsight Integration

The growing data leak from the Salesforce ecosystem has taken a new turn after the ShinyHunters group announced its involvement...
Redazione RHC - 24 November 2025

BadAudio Discovered: Ghost Malware Used by APT24 for Three Years Undetected

Researchers at the Google Threat Intelligence Group (GTIG) have uncovered details of an espionage campaign conducted by the Chinese group...
Redazione RHC - 24 November 2025

Satoshi Nakamoto’s Net Worth Drops 34% as Cryptocurrency Crash

The net worth of Satoshi Nakamoto, the mysterious figure known as the founder of Bitcoin, has dropped 34% in the...
Redazione RHC - 24 November 2025

Let’s find out what cyber insurance is. It insures your online business, but not only that.

The digital world is constantly evolving, and with the growth of online activity, protecting your business from potential cyber threats has become increasingly important. Cyber insurance is a form of...
Share on Facebook Share on LinkedIn Share on X

Let’s find out what Business Impact Analysis (BIA) is

Business Impact Analysis (BIA) is a fundamental tool for ensuring business continuity. BIA helps organizations identify activities critical to their operations, the risks associated with those activities, and the impacts...
Share on Facebook Share on LinkedIn Share on X

What is risk analysis in ICT Risk Management?

Risk analysis is an important process in the context of ICT Risk Management as it allows us to evaluate the effectiveness of the technical countermeasures adopted to mitigate ICT risks....
Share on Facebook Share on LinkedIn Share on X

What is Web Scraping? Let’s Understand It Better

We have often talked about huge user databases being sold on underground forums and said that this was web scraping. In April 2021, Facebook lost 533 million users , while...
Share on Facebook Share on LinkedIn Share on X

What is a zero-day and the risk of targeted cyber attacks

Zero-day vulnerabilities are one of the greatest cybersecurity risks for organizations. These are unknown and unpatched vulnerabilities that attackers exploit to penetrate IT systems and compromise data security. In this...
Share on Facebook Share on LinkedIn Share on X

The world of software vulnerabilities: how they’re exploited, who creates them, and how to protect yourself.

Software vulnerabilities pose a threat to cybersecurity because hackers can exploit them to gain access to computer systems. A software vulnerability is a flaw in software that can be used...
Share on Facebook Share on LinkedIn Share on X

Exploring Cyberspace: States and Wars Without Geographic Borders

The concept of cyber risk is increasingly becoming mainstream. Cybersecurity is a rapidly evolving field. But to help you understand the broader context of what we now call cyberspace, between...
Share on Facebook Share on LinkedIn Share on X

Who invented the World Wide Web? The story of Timothy Berners-Lee, the genius behind the web

We all use the internet every day, at all hours, our smartphone has become an active prosthesis of our body, but have we ever wondered who invented the World Wide...
Share on Facebook Share on LinkedIn Share on X

Marketing is nothing! VPNs sell themselves every time a government blocks adult sites

Hundreds of millions of smartphone users have faced blocking of pornographic websites and mandatory age verification. The UK has introduced mandatory identity verification on adult websites , and similar laws...
Share on Facebook Share on LinkedIn Share on X

Hackers: Who They Are, What They Do, and Their Role in Today’s World

The meaning of " hacker " has deep roots. It derives from the English "to hack," meaning to chip away, cut, strike, or cut. It's a powerful image, that of...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sito
DIG AI: The Dark Web’s New AI Tool for Cybercrime
Redazione RHC - 21/12/2025

A new AI tool has appeared on the dark web and quickly attracted the attention of security experts, and not for the best of reasons. This is an artificial intelligence service called DIG AI, which…

Immagine del sito
Airbus Eyes Sovereign Cloud to Mitigate US Data Risks
Redazione RHC - 21/12/2025

In recent months, a question has been emerging with increasing insistence on European corporate boards: is the US cloud really safe for all companies? Especially for those operating in strategic sectors or with economic, industrial,…

Immagine del sito
North Korean Hackers Steal $2 Billion in Crypto, Targeting DeFi Sector
Redazione RHC - 21/12/2025

In 2025, North Korean hackers stole a record $2 billion in cryptocurrency , 51% more than the previous year. However, the number of attacks has decreased, while the damage has increased. According to Chainalysis, North…

Immagine del sito
Linux Kernel CVE-2025-68260 Vulnerability Fixed: Rust Code at Risk
Redazione RHC - 19/12/2025

The world of technology is a veritable battlefield, where coding geniuses challenge malicious attackers every day with exploits and security patches. That’s why the recent discovery of a vulnerability in the Linux kernel has caused…

Immagine del sito
HPE OneView Vulnerability CVE-2025-37164: Critical Security Update Required
Redazione RHC - 18/12/2025

Cybersecurity is a serious issue, especially when it comes to vulnerabilities that can compromise an entire system. Well, Hewlett Packard Enterprise (HPE) has just raised the alarm about a truly worrying security flaw in its…