Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Fortinet 320x100px
LECS 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Microsoft CEO on AI Challenges Cybercrime

Microsoft CEO on AI Challenges

In a conversation with Matthias Döpfner, CEO of Axel Springer, Microsoft CEO Satya Nadella acknowledged that the Redmond-based company's impressive...
Redazione RHC - 7 December 2025
Pat Gelsinger on Quantum Computing Impact on AI Future Cybercrime

Pat Gelsinger on Quantum Computing Impact on AI Future

Former Intel CEO Pat Gelsinger has shared a series of assessments on the future of computing, and in particular, the...
Redazione RHC - 7 December 2025
AI-Generated Scams: New Threats with Deepfake Photos and Videos Cybercrime

AI-Generated Scams: New Threats with Deepfake Photos and Videos

Criminals are increasingly using photos and videos from public sources to pass them off as evidence of an alleged kidnapping....
Redazione RHC - 7 December 2025
Microsoft Windows LNK Vulnerability Exploited by Hackers Cybercrime

Microsoft Windows LNK Vulnerability Exploited by Hackers

Experts have discovered that in the summer of 2025, Microsoft patched a dangerous vulnerability in Windows that had been actively...
Redazione RHC - 6 December 2025
Apache Tika Vulnerability CVE-2025-66516: Critical XXE Attack Risk Cybercrime

Apache Tika Vulnerability CVE-2025-66516: Critical XXE Attack Risk

A critical vulnerability has been published in Apache Tika that could allow an XML external entity injection attack, known as...
Redazione RHC - 6 December 2025
China Accuses US of Cyber Attacks, Denies Involvement in Brickstorm Malware Cybercrime

China Accuses US of Cyber Attacks, Denies Involvement in Brickstorm Malware

A spokesperson for the Chinese Embassy in Canada responded to a reporter's question about the outcry in Canada over so-called...
Redazione RHC - 6 December 2025

The stress of social network algorithms causes burnout in creators

A new research project has shown that the online content industry, which has offered people thousands of new ways to earn money, is also placing significant mental stress on its...
Share on Facebook Share on LinkedIn Share on X

Discovering Tor Browser: The Digital Fortress for Online Privacy

Tor Browser (short for The Onion Router) is a free, open-source web browser designed specifically to protect users' online privacy. Using a network of servers distributed around the world, Tor...
Share on Facebook Share on LinkedIn Share on X

Virtual Private Network (VPN): What It Is, How It Works, and Why

A VPN , short for Virtual Private Network, is a system that allows you to establish a secure and private connection over a public network, such as the Internet ....
Share on Facebook Share on LinkedIn Share on X

Rare Earths: What They Are and Why They Matter More Than Oil in Today’s World

We often hear about the so-called "Rare Earths". This is a set of seventeen metallic elements. These include the fifteen lanthanides on the periodic table , plus scandium and yttrium...
Share on Facebook Share on LinkedIn Share on X

Let’s discover injections explained in a simple way

Good morning everyone. I'm Davide Cavallini, a web developer and penetration tester. Today I'm going to talk about injections. There are various types, but what does it conceptually mean to...
Share on Facebook Share on LinkedIn Share on X

A journey into the world of OT/ICS: What are SCADA servers?

The world of OT (Operational Technology) and ICS (Industrial Control Systems) is closely related to SCADA (Supervisory Control and Data Acquisition) systems. In industrial automation, SCADA systems play a fundamental...
Share on Facebook Share on LinkedIn Share on X

Quishing: What it is, how it works, and how to protect yourself

Quishing is an emerging form of cyberattack that combines traditional phishing with the use of QR codes , tools now familiar to many. The term " quishing " is a...
Share on Facebook Share on LinkedIn Share on X

Password Managers: A Complete Guide to Choosing and Using Them

Passwords: how important are they in our digital lives? How many times have we reported this on our pages? Most digital activities— from social media to banking to online shopping...
Share on Facebook Share on LinkedIn Share on X

Discovering the NIS2 Directive: Security and Resilience of Digital Systems in the European Union

On 10 November 2022, the European Parliament, by a large majority, approved the NIS2 (Network and Information System Security) Directive with its publication in the Official Journal of the European...
Share on Facebook Share on LinkedIn Share on X

Kraken Arrives: The New Ransomware That Assesses Your Environment to Inflict Maximum Damage

Cisco Talos researchers have detected an active wave of attacks using a new ransomware called Kraken. The group began operating in February 2025 and uses double-extortion methods, without targeting specific...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
VoidLink Malware: Advanced Linux Framework Targets Cloud Infrastructures
Redazione RHC - 16/01/2026

Check Point researchers have discovered a new Linux infection framework distinguished by its advanced modular architecture and wide range of features. The malware has been dubbed VoidLink . The framework is composed of over 30…

Immagine del sitoCybercrime
Microsoft Copilot Vulnerability Exposes User Data to Hackers
Redazione RHC - 15/01/2026

A recently fixed vulnerability allowed attackers to exploit Microsoft Copilot Personal with a single click to steal sensitive user data. Using a phishing link, attackers were able to take control of sessions without requiring further…

Immagine del sitoCybercrime
Progress Software Patches LoadMaster, MOVEit WAF Vulnerabilities
Redazione RHC - 15/01/2026

On January 12, 2026, Progress Software Corporation released patches that address two high-severity Command Injection vulnerabilities, which could allow remote attackers to execute malicious code on LoadMaster load balancers and MOVEit Web Application Firewalls (WAFs).…

Immagine del sitoCybercrime
24-Year-Old Hacker Breaches US Supreme Court Database
Redazione RHC - 14/01/2026

Do you remember the 24-year-old hacker Carmelo Miano and the breaches of the Naples Prosecutor’s Office’s accounts and computer systems? It appears something similar happened in the United States, and the other young man is…

Immagine del sitoCybercrime
Cloudflare vs Italy: The Battle for Internet Freedom and DNS Control
Redazione RHC - 14/01/2026

Cloudflare CEO Matthew Prince has threatened to shut down the company’s operations in Italy after the country’s telecom regulator fined it twice its annual revenue in the country. The facts The conflict erupted around Italy’s…