Red Hot Cyber. The Cybersecurity Blog
Featured Articles

A VPN , short for Virtual Private Network, is a system that allows you to establish a secure and private connection over a public network, such as the Internet . In practice, it creates what is called...

Passwords: how important are they in our digital lives? How many times have we reported this on our pages? Most digital activities— from social media to banking to online shopping —require unique ...

On 10 November 2022, the European Parliament, by a large majority, approved the NIS2 (Network and Information System Security) Directive with its publication in the Official Journal of the European Un...

Cisco Talos researchers have detected an active wave of attacks using a new ransomware called Kraken. The group began operating in February 2025 and uses double-extortion methods, without targeting sp...

In the world of cybersecurity, firewalls are the first line of defense against cyber threats and attacks. Every day, businesses and home users are exposed to risks such as malware, ransomware, and una...
From Body to Screen: How Sexual Abuse Has Moved to the Digital World
Apache Tomcat Vulnerability: Update Now to Avoid Security Risks
Paycheck piracy is coming! And the paycheck transfer goes to criminals.
CrowdStrike: 76% of organizations struggle to combat AI attacks
Whisper 2FA: The New Phishing Tool That Steals Microsoft 365 Credentials
Microsoft Teams will spy on your boss when you’re out of the office! Location tracking will be rolled out in December.

From Body to Screen: How Sexual Abuse Has Moved to the Digital World
Paolo Galdieri - October 28th, 2025
This is the second in a series of articles analyzing gender-based violence in the digital context, in anticipation of November 25th, the International Day for the Elimination of Violence against...

Apache Tomcat Vulnerability: Update Now to Avoid Security Risks
Redazione RHC - October 28th, 2025
Many web applications rely on Apache Tomcat, a widely used open-source Java servlet container. On October 27, 2025, Apache disclosed two vulnerabilities: CVE-2025-55752 and CVE-2025-55754, affecting several versions of Tomcat....

Paycheck piracy is coming! And the paycheck transfer goes to criminals.
Redazione RHC - October 28th, 2025
According to a new report from Microsoft Threat Intelligence , the financially motivated Storm-2657 group is conducting large-scale attacks against universities and businesses , using stolen employee accounts to redirect...

CrowdStrike: 76% of organizations struggle to combat AI attacks
Redazione RHC - October 28th, 2025
Enterprises are lagging behind in ransomware preparedness as adversaries use AI across the attack chain to accelerate intrusion, encryption and extortion. Milan – October 27, 2025 – According to CrowdStrike...

Whisper 2FA: The New Phishing Tool That Steals Microsoft 365 Credentials
Redazione RHC - October 27th, 2025
According to new research from Barracuda Networks , a particularly insidious and persistent new Phishing-as-a-Service (PhaaS) kit is stealing credentials and authentication tokens from Microsoft 365 users. Barracuda experts have...

Microsoft Teams will spy on your boss when you’re out of the office! Location tracking will be rolled out in December.
Redazione RHC - October 27th, 2025
Microsoft Teams will receive an update in December 2025 that will allow you to track employee locations over your office Wi-Fi network. According to the Microsoft 365 roadmap , "when...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

