Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Enterprise BusinessLog 320x200 1
970x20 Itcentric

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Virtual Private Network (VPN): What It Is, How It Works, and Why
Di Redazione RHC - 15/11/2025

A VPN , short for Virtual Private Network, is a system that allows you to establish a secure and private connection over a public network, such as the Internet . In practice, it creates what is called...

Immagine del sito
Password Managers: A Complete Guide to Choosing and Using Them
Di Redazione RHC - 15/11/2025

Passwords: how important are they in our digital lives? How many times have we reported this on our pages? Most digital activities— from social media to banking to online shopping —require unique ...

Immagine del sito
Discovering the NIS2 Directive: Security and Resilience of Digital Systems in the European Union
Di Riccardo Nuti - 15/11/2025

On 10 November 2022, the European Parliament, by a large majority, approved the NIS2 (Network and Information System Security) Directive with its publication in the Official Journal of the European Un...

Immagine del sito
Kraken Arrives: The New Ransomware That Assesses Your Environment to Inflict Maximum Damage
Di Redazione RHC - 15/11/2025

Cisco Talos researchers have detected an active wave of attacks using a new ransomware called Kraken. The group began operating in February 2025 and uses double-extortion methods, without targeting sp...

Immagine del sito
Understanding Firewalls: The First Line of Defense in Cybersecurity
Di Redazione RHC - 15/11/2025

In the world of cybersecurity, firewalls are the first line of defense against cyber threats and attacks. Every day, businesses and home users are exposed to risks such as malware, ransomware, and una...

From Body to Screen: How Sexual Abuse Has Moved to the Digital World

This is the second in a series of articles analyzing gender-based violence in the digital context, in anticipation of November 25th, the International...
Paolo Galdieri - 28/10/2025 - 07:07

Apache Tomcat Vulnerability: Update Now to Avoid Security Risks

Many web applications rely on Apache Tomcat, a widely used open-source Java servlet container. On October 27, 2025, Apache disclosed two vulnerabiliti...
Redazione RHC - 28/10/2025 - 06:52

Paycheck piracy is coming! And the paycheck transfer goes to criminals.

According to a new report from Microsoft Threat Intelligence , the financially motivated Storm-2657 group is conducting large-scale attacks against un...
Redazione RHC - 28/10/2025 - 06:40

CrowdStrike: 76% of organizations struggle to combat AI attacks

Enterprises are lagging behind in ransomware preparedness as adversaries use AI across the attack chain to accelerate intrusion, encryption and extort...
Redazione RHC - 28/10/2025 - 06:30

Whisper 2FA: The New Phishing Tool That Steals Microsoft 365 Credentials

According to new research from Barracuda Networks , a particularly insidious and persistent new Phishing-as-a-Service (PhaaS) kit is stealing credenti...
Redazione RHC - 27/10/2025 - 17:45

Microsoft Teams will spy on your boss when you’re out of the office! Location tracking will be rolled out in December.

Microsoft Teams will receive an update in December 2025 that will allow you to track employee locations over your office Wi-Fi network. According to t...
Redazione RHC - 27/10/2025 - 13:47
1 34 35 36 37 38 242

From Body to Screen: How Sexual Abuse Has Moved to the Digital World

- October 28th, 2025

This is the second in a series of articles analyzing gender-based violence in the digital context, in anticipation of November 25th, the International Day for the Elimination of Violence against...

Facebook Linkedin X

Apache Tomcat Vulnerability: Update Now to Avoid Security Risks

- October 28th, 2025

Many web applications rely on Apache Tomcat, a widely used open-source Java servlet container. On October 27, 2025, Apache disclosed two vulnerabilities: CVE-2025-55752 and CVE-2025-55754, affecting several versions of Tomcat....

Facebook Linkedin X

Paycheck piracy is coming! And the paycheck transfer goes to criminals.

- October 28th, 2025

According to a new report from Microsoft Threat Intelligence , the financially motivated Storm-2657 group is conducting large-scale attacks against universities and businesses , using stolen employee accounts to redirect...

Facebook Linkedin X

CrowdStrike: 76% of organizations struggle to combat AI attacks

- October 28th, 2025

Enterprises are lagging behind in ransomware preparedness as adversaries use AI across the attack chain to accelerate intrusion, encryption and extortion. Milan – October 27, 2025 – According to CrowdStrike...

Facebook Linkedin X

Whisper 2FA: The New Phishing Tool That Steals Microsoft 365 Credentials

- October 27th, 2025

According to new research from Barracuda Networks , a particularly insidious and persistent new Phishing-as-a-Service (PhaaS) kit is stealing credentials and authentication tokens from Microsoft 365 users. Barracuda experts have...

Facebook Linkedin X

Microsoft Teams will spy on your boss when you’re out of the office! Location tracking will be rolled out in December.

- October 27th, 2025

Microsoft Teams will receive an update in December 2025 that will allow you to track employee locations over your office Wi-Fi network. According to the Microsoft 365 roadmap , "when...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE