Red Hot Cyber. The Cybersecurity Blog
Featured Articles

Gartner analysts have urged businesses to temporarily stop using browsers with built-in artificial intelligence (AI) capabilities . In a recent advisory, the company emphasizes that such tools pose un...

A critical vulnerability affecting the FortiOS, FortiWeb, FortiProxy , and FortiSwitchManager product lines has been reported by Fortinet via an urgent security advisory. This advisory was issued in c...

It seems the White House isn’t entirely clear … at least judging by yet another change of heart regarding the sale of Nvidia’s advanced chips to China, with the Trump administration having decid...

According to a recently released report by the Financial Crimes Enforcement Network (FinCEN) , global ransomware activity peaked in 2023, only to plummet in 2024. This decline is attributed to success...

Despite significant geopolitical challenges, the mercenary spyware industry remains a resilient and persistent threat; in this context, the well-known vendor Intellexa continues to expand its arsenal....
Cognitive Biases and Cybersecurity: The Fatal Fallacy of “I Have Nothing to Hide”
Did they give you a digital photo frame? It’s more than just family memories.
What are PsyOps? Exploring mind manipulation in the digital age.
Understanding Firewalls: The First Line of Defense in Cybersecurity
Critical Vulnerability in FortiWeb: Fortinet and CISA Recommend Urgent Updates
China’s New Era of Robots: Shenzhen at the Center of the Technological Revolution

Cognitive Biases and Cybersecurity: The Fatal Fallacy of “I Have Nothing to Hide”
Fabrizio Saviano - November 14th, 2025
In Italy, over 3,000 people lose their lives on the roads every year, despite everyone knowing basic safety rules. In cybercrime, the scenario isn't all that different: millions of victims...

Did they give you a digital photo frame? It’s more than just family memories.
Redazione RHC - November 14th, 2025
Researchers have discovered several critical vulnerabilities in Uhale digital picture frames running Android , with some models even downloading and executing malware during startup. They examined the Uhale app and...

What are PsyOps? Exploring mind manipulation in the digital age.
Redazione RHC - November 14th, 2025
Psychological operations, commonly known as PsyOps, are a significant and often poorly understood element of military and security strategy . These operations involve the use of psychological tactics to influence...

Understanding Firewalls: The First Line of Defense in Cybersecurity
Redazione RHC - November 14th, 2025
In the world of cybersecurity, firewalls are the first line of defense against cyber threats and attacks. Every day, businesses and home users are exposed to risks such as malware,...

Critical Vulnerability in FortiWeb: Fortinet and CISA Recommend Urgent Updates
Redazione RHC - November 14th, 2025
Fortinet has confirmed the discovery of a critical relative path vulnerability (CWE-23) in FortiWeb devices, identified as CVE-2025-64446 and registered as IR Number FG-IR-25-910 . The flaw, published on November...

China’s New Era of Robots: Shenzhen at the Center of the Technological Revolution
Redazione RHC - November 14th, 2025
The 15th Chinese National Games opened with a spectacle that combined sport and technology. Among the highlights were robots capable of playing ancient bronze instruments, artificial intelligence systems capable of...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

