Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The concept of cyber risk is increasingly becoming mainstream. Cybersecurity is a rapidly evolving field. But to help you understand the broader context of what we now call cyberspace, between the bea...

We all use the internet every day, at all hours, our smartphone has become an active prosthesis of our body, but have we ever wondered who invented the World Wide Web? Today we talk about Timothy Bern...

Hundreds of millions of smartphone users have faced blocking of pornographic websites and mandatory age verification. The UK has introduced mandatory identity verification on adult websites , and simi...

From the weaknesses of WEP to the advances of WPA3 , Wi-Fi network security has come a long way. Today, self-defending networks represent the new frontier: intelligent systems capable of detecting, bl...

A rare find from the early days of Unix may take researchers back to the very origins of the operating system. A magnetic tape labeled ” UNIX Original From Bell Labs V4 (See Manual for format) &...
Cyberdrones, radar evasion, and autonomous swarms: Rome, the invisible challenge of Jubilee 2025
It all started with LinkedIn and a work contact: developers lured, crypto wallets emptied
Nvidia, Microsoft, and xAI join forces to acquire Aligned Data Centers for $40 billion
From online fraud to organ trafficking. South Korea repatriates citizens from Cambodia.
Bus becomes travelling museum of retro computers in UK
A computer science degree is no longer a guarantee of employment. AI is stealing jobs (and interviews).

Cyberdrones, radar evasion, and autonomous swarms: Rome, the invisible challenge of Jubilee 2025
Francesco Demarcus - October 17th, 2025
Jubilee 2025 in Rome presents a challenge not only for managing millions of pilgrims and tourists, but also for protecting urban airspace. Drones, increasingly widespread and accessible, bring with them...

It all started with LinkedIn and a work contact: developers lured, crypto wallets emptied
Redazione RHC - October 17th, 2025
A North Korean group linked to the DPRK has developed EtherHiding , a method for hiding malicious code within public blockchain smart contracts and modifying payloads on the fly. According...

Nvidia, Microsoft, and xAI join forces to acquire Aligned Data Centers for $40 billion
Redazione RHC - October 17th, 2025
A consortium of Nvidia, Microsoft, BlackRock and xAI , the company founded by Elon Musk , announced on Wednesday an agreement to acquire Aligned Data Centers for a total value...

From online fraud to organ trafficking. South Korea repatriates citizens from Cambodia.
Redazione RHC - October 17th, 2025
South Korea has launched a repatriation operation for its citizens from Cambodia, following reports of kidnappings, violence and the death of a 22-year-old student who was the victim of a...

Bus becomes travelling museum of retro computers in UK
Redazione RHC - October 16th, 2025
In the UK, father and son Jason and Luke Stoner have transformed an old school bus into a traveling museum dedicated to retro computers and game consoles. The inspiration came...

A computer science degree is no longer a guarantee of employment. AI is stealing jobs (and interviews).
Redazione RHC - October 16th, 2025
Once upon a time, a degree in computer science was a guarantee of success. Competitive salaries, generous benefits, and immediate employment opportunities were the norm. Today, however, for many young...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

