Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Banner Ancharia Mobile 1
Banner Desktop

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Exploring Cyberspace: States and Wars Without Geographic Borders
Di Massimiliano Brolli - 11/11/2025

The concept of cyber risk is increasingly becoming mainstream. Cybersecurity is a rapidly evolving field. But to help you understand the broader context of what we now call cyberspace, between the bea...

Immagine del sito
Who invented the World Wide Web? The story of Timothy Berners-Lee, the genius behind the web
Di Redazione RHC - 11/11/2025

We all use the internet every day, at all hours, our smartphone has become an active prosthesis of our body, but have we ever wondered who invented the World Wide Web? Today we talk about Timothy Bern...

Immagine del sito
Marketing is nothing! VPNs sell themselves every time a government blocks adult sites
Di Redazione RHC - 11/11/2025

Hundreds of millions of smartphone users have faced blocking of pornographic websites and mandatory age verification. The UK has introduced mandatory identity verification on adult websites , and simi...

Immagine del sito
Wi-Fi Security: The Evolution from WEP to WPA3 and Self-Defending Networks
Di Francesco Demarcus - 11/11/2025

From the weaknesses of WEP to the advances of WPA3 , Wi-Fi network security has come a long way. Today, self-defending networks represent the new frontier: intelligent systems capable of detecting, bl...

Immagine del sito
The Origins of UNIX: The Original Bell Labs Tape Resurfaces from Utah
Di Redazione RHC - 10/11/2025

A rare find from the early days of Unix may take researchers back to the very origins of the operating system. A magnetic tape labeled ” UNIX Original From Bell Labs V4 (See Manual for format) &...

Cyberdrones, radar evasion, and autonomous swarms: Rome, the invisible challenge of Jubilee 2025

Jubilee 2025 in Rome presents a challenge not only for managing millions of pilgrims and tourists, but also for protecting urban airspace. Drones, inc...
Francesco Demarcus - 17/10/2025 - 11:16

It all started with LinkedIn and a work contact: developers lured, crypto wallets emptied

A North Korean group linked to the DPRK has developed EtherHiding , a method for hiding malicious code within public blockchain smart contracts and mo...
Redazione RHC - 17/10/2025 - 11:07

Nvidia, Microsoft, and xAI join forces to acquire Aligned Data Centers for $40 billion

A consortium of Nvidia, Microsoft, BlackRock and xAI , the company founded by Elon Musk , announced on Wednesday an agreement to acquire Aligned Data ...
Redazione RHC - 17/10/2025 - 10:33

From online fraud to organ trafficking. South Korea repatriates citizens from Cambodia.

South Korea has launched a repatriation operation for its citizens from Cambodia, following reports of kidnappings, violence and the death of a 22-yea...
Redazione RHC - 17/10/2025 - 08:26

Bus becomes travelling museum of retro computers in UK

In the UK, father and son Jason and Luke Stoner have transformed an old school bus into a traveling museum dedicated to retro computers and game conso...
Redazione RHC - 16/10/2025 - 19:06

A computer science degree is no longer a guarantee of employment. AI is stealing jobs (and interviews).

Once upon a time, a degree in computer science was a guarantee of success. Competitive salaries, generous benefits, and immediate employment opportuni...
Redazione RHC - 16/10/2025 - 18:26
1 40 41 42 43 44 231

Cyberdrones, radar evasion, and autonomous swarms: Rome, the invisible challenge of Jubilee 2025

- October 17th, 2025

Jubilee 2025 in Rome presents a challenge not only for managing millions of pilgrims and tourists, but also for protecting urban airspace. Drones, increasingly widespread and accessible, bring with them...

Facebook Linkedin X

It all started with LinkedIn and a work contact: developers lured, crypto wallets emptied

- October 17th, 2025

A North Korean group linked to the DPRK has developed EtherHiding , a method for hiding malicious code within public blockchain smart contracts and modifying payloads on the fly. According...

Facebook Linkedin X

Nvidia, Microsoft, and xAI join forces to acquire Aligned Data Centers for $40 billion

- October 17th, 2025

A consortium of Nvidia, Microsoft, BlackRock and xAI , the company founded by Elon Musk , announced on Wednesday an agreement to acquire Aligned Data Centers for a total value...

Facebook Linkedin X

From online fraud to organ trafficking. South Korea repatriates citizens from Cambodia.

- October 17th, 2025

South Korea has launched a repatriation operation for its citizens from Cambodia, following reports of kidnappings, violence and the death of a 22-year-old student who was the victim of a...

Facebook Linkedin X

Bus becomes travelling museum of retro computers in UK

- October 16th, 2025

In the UK, father and son Jason and Luke Stoner have transformed an old school bus into a traveling museum dedicated to retro computers and game consoles. The inspiration came...

Facebook Linkedin X

A computer science degree is no longer a guarantee of employment. AI is stealing jobs (and interviews).

- October 16th, 2025

Once upon a time, a degree in computer science was a guarantee of success. Competitive salaries, generous benefits, and immediate employment opportunities were the norm. Today, however, for many young...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE