Welcome to Red Hot Cyber | Cybersecurity News
Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
LECS 320x100 1
UtiliaCS 970x120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Cyberattack on Eurofiber France: Find out what happened

On November 13, Eurofiber France, a respected provider of fiber optic network and VPN solutions to many of France's leading...
Redazione RHC - 24 November 2025

From Risk to Resilience: How Veeam Protects Your Supply Chain from Disruptions

With the increasing digitalization of the supply chain , resilience is no longer just about logistics and suppliers, but also...
Redazione RHC - 24 November 2025

When the Cloud Falls: How a Small Mistake Brought the Global Internet to Its Knees

This fall, we've had quite a bit of a cloud headache, I don't know if you've noticed. That is, AWS,...
Gaia Russo - 24 November 2025

Father and son break world speed record with homemade drone

This summer, in the Dubai desert, a flight occurred that few expected to see from a battery-powered quadcopter. The experimental...
Redazione RHC - 23 November 2025

Microsoft Blocks KMS38 Activation Method for Windows 10 and 11

Users noticed that last week Microsoft developers disabled the offline activation method for Windows 11 and 10 via KMS38, which...
Redazione RHC - 23 November 2025

Future prospects for computer science and technology graduates

Artificial intelligence is changing the way recent computer science graduates approach the world of work. It's not about sudden job...
Redazione RHC - 23 November 2025

The First Hackers in History: Hacking Is a Journey, Not a Destination

The word hacking comes from the English verb “to hack,” which means “to damage.” Today, with this short article, I will tell you a piece of the history of hacking,...
Share on Facebook Share on LinkedIn Share on X

The extraordinary story of Alan Turing, the father of computer science: from his tumultuous childhood to his revolutionary contributions

Madras, early 1900s. The British Empire dominates India. Julius, a history graduate from Oxford University, serves as a colonial administrative clerk in the Indian Civil Service. He and his wife,...
Share on Facebook Share on LinkedIn Share on X
Evoluzione-da-wep-a-wpa-3

Wi-Fi Security: The Evolution from WEP to WPA3 and Self-Defending Networks

From the weaknesses of WEP to the advances of WPA3 , Wi-Fi network security has come a long way. Today, self-defending networks represent the new frontier: intelligent systems capable of...
Share on Facebook Share on LinkedIn Share on X

The Windows 98 Blue Screen of Death That Changed Microsoft’s Plans

It was April 20, 1998. Microsoft was so embarrassed by the iconic Windows 98 blue screen of death on stage that it decided to change plans for building a new...
Share on Facebook Share on LinkedIn Share on X

Roblox: The Platform That Puts Children’s Safety at Risk

With over 100 million daily active users , Roblox attracts countless children around the world. Nearly half of its audience is under 13, and in Australia, young players spend an...
Share on Facebook Share on LinkedIn Share on X

The Origins of UNIX: The Original Bell Labs Tape Resurfaces from Utah

A rare find from the early days of Unix may take researchers back to the very origins of the operating system. A magnetic tape labeled " UNIX Original From Bell...
Share on Facebook Share on LinkedIn Share on X

21 Years of Firefox: A History of Innovation and Independence

November 9th marked the 21st anniversary of Firefox 1.0. In 2004, it was the first stable release of Mozilla's new browser, which quickly positioned itself as a simple and secure...
Share on Facebook Share on LinkedIn Share on X

Hyundai subsidiary HAEA data breach: Sensitive information at risk

HAEA, a subsidiary of South Korean Hyundai Motor Group and headquartered in California, USA, provides customized IT solutions and services for the automotive industry, particularly to Hyundai and Kia subsidiaries....
Share on Facebook Share on LinkedIn Share on X

Malware is a ticking time bomb! The threat to Siemens S7 PLCs begins in 2027.

Researchers discovered several libraries in the public NuGet registry containing code that will be activated in 2027 and 2028. The infected packages target three popular .NET data storage engines (Microsoft...
Share on Facebook Share on LinkedIn Share on X

The Illicit Distribution of Intimate Images: A Threat to Women’s Freedom

This is the fourth in a series of articles analyzing gender-based violence in the digital context, in anticipation of November 25, the International Day for the Elimination of Violence against...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sito
DIG AI: The Dark Web’s New AI Tool for Cybercrime
Redazione RHC - 21/12/2025

A new AI tool has appeared on the dark web and quickly attracted the attention of security experts, and not for the best of reasons. This is an artificial intelligence service called DIG AI, which…

Immagine del sito
Airbus Eyes Sovereign Cloud to Mitigate US Data Risks
Redazione RHC - 21/12/2025

In recent months, a question has been emerging with increasing insistence on European corporate boards: is the US cloud really safe for all companies? Especially for those operating in strategic sectors or with economic, industrial,…

Immagine del sito
North Korean Hackers Steal $2 Billion in Crypto, Targeting DeFi Sector
Redazione RHC - 21/12/2025

In 2025, North Korean hackers stole a record $2 billion in cryptocurrency , 51% more than the previous year. However, the number of attacks has decreased, while the damage has increased. According to Chainalysis, North…

Immagine del sito
Linux Kernel CVE-2025-68260 Vulnerability Fixed: Rust Code at Risk
Redazione RHC - 19/12/2025

The world of technology is a veritable battlefield, where coding geniuses challenge malicious attackers every day with exploits and security patches. That’s why the recent discovery of a vulnerability in the Linux kernel has caused…

Immagine del sito
HPE OneView Vulnerability CVE-2025-37164: Critical Security Update Required
Redazione RHC - 18/12/2025

Cybersecurity is a serious issue, especially when it comes to vulnerabilities that can compromise an entire system. Well, Hewlett Packard Enterprise (HPE) has just raised the alarm about a truly worrying security flaw in its…