Red Hot Cyber. The Cybersecurity Blog
Featured Articles

In recent months, a new cyber operations infrastructure has been developing in the United States, in which automated agents are becoming not just a support tool, but a full-fledged participant in offe...

The scale of the leak, described by a team from the University of Vienna , demonstrates how dangerous the familiar contact search function of popular messaging apps can be. WhatsApp has always emphasi...

November 18, 2025 – After hours of widespread disruptions , the incident affecting Cloudflare’s global network finally appears to be nearing resolution. The company announced it has implemented a ...

Two serious vulnerabilities in IBM’s AIX operating system could allow remote attackers to execute arbitrary commands on affected systems, prompting the company to issue important security updates. B...

The room is the same: dim lights, chairs in a circle, thermoses of herbal teas now cold from all the talking and venting. We are Shakerati Anonimi , a group of people who never imagined we’d end up ...
“YOU ARE WORTH IT, YOU’RE NEVER TOO YOUNG TO CHANGE THE WORLD”: Nicola Bellotti’s vision
Gemini 3.0 Pro: What people who are trying it say
From Body to Screen: How Sexual Abuse Has Moved to the Digital World
Apache Tomcat Vulnerability: Update Now to Avoid Security Risks
Paycheck piracy is coming! And the paycheck transfer goes to criminals.
CrowdStrike: 76% of organizations struggle to combat AI attacks

“YOU ARE WORTH IT, YOU’RE NEVER TOO YOUNG TO CHANGE THE WORLD”: Nicola Bellotti’s vision
Olivia Terragni - October 28th, 2025
We often try to explain the hybrid, simultaneous, and contradictory world in which young people live in perpetual connection, but the truth is that as adults, we struggle to understand...

Gemini 3.0 Pro: What people who are trying it say
Redazione RHC - October 28th, 2025
In recent days, a select few users have reported having access to the new Gemini 3.0 Pro model. Initial impressions suggest a significant improvement over the previous generation, so much...

From Body to Screen: How Sexual Abuse Has Moved to the Digital World
Paolo Galdieri - October 28th, 2025
This is the second in a series of articles analyzing gender-based violence in the digital context, in anticipation of November 25th, the International Day for the Elimination of Violence against...

Apache Tomcat Vulnerability: Update Now to Avoid Security Risks
Redazione RHC - October 28th, 2025
Many web applications rely on Apache Tomcat, a widely used open-source Java servlet container. On October 27, 2025, Apache disclosed two vulnerabilities: CVE-2025-55752 and CVE-2025-55754, affecting several versions of Tomcat....

Paycheck piracy is coming! And the paycheck transfer goes to criminals.
Redazione RHC - October 28th, 2025
According to a new report from Microsoft Threat Intelligence , the financially motivated Storm-2657 group is conducting large-scale attacks against universities and businesses , using stolen employee accounts to redirect...

CrowdStrike: 76% of organizations struggle to combat AI attacks
Redazione RHC - October 28th, 2025
Enterprises are lagging behind in ransomware preparedness as adversaries use AI across the attack chain to accelerate intrusion, encryption and extortion. Milan – October 27, 2025 – According to CrowdStrike...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

