Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The psychology of passwords starts right here: trying to understand people before systems. Welcome to “The Mind Behind Passwords,” the column that looks at cybersecurity. From a different perspect...

New details emerge from an Amazon Threat Intelligence report that highlight an alarming shift in Russian government-backed cyber operations. High-level 0-day exploits, often attributed to state-sponso...

A new version, 8.8.9, of the popular text editor Notepad++, has been released by its developers, fixing a flaw in the automatic update system . This issue came to light after some users and investigat...

A recent study by SentinelLabs sheds new light on the roots of the hacker group known as “Salt Typhoon ,” which carried out one of the most audacious espionage operations of the past decade. First...

Shannon acts as a penetration tester who doesn’t just report vulnerabilities, but launches actual exploits. Shannon’s goal is to breach your web application’s security before anyone with malicio...
Quishing: What it is, how it works, and how to protect yourself
Password Managers: A Complete Guide to Choosing and Using Them
Discovering the NIS2 Directive: Security and Resilience of Digital Systems in the European Union
Kraken Arrives: The New Ransomware That Assesses Your Environment to Inflict Maximum Damage
North Korea reorganizes its intelligence with a new agency
Cognitive Biases and Cybersecurity: The Fatal Fallacy of “I Have Nothing to Hide”

Quishing: What it is, how it works, and how to protect yourself
Redazione RHC - November 14th, 2025
Quishing is an emerging form of cyberattack that combines traditional phishing with the use of QR codes , tools now familiar to many. The term " quishing " is a...

Password Managers: A Complete Guide to Choosing and Using Them
Redazione RHC - November 14th, 2025
Passwords: how important are they in our digital lives? How many times have we reported this on our pages? Most digital activities— from social media to banking to online shopping...

Discovering the NIS2 Directive: Security and Resilience of Digital Systems in the European Union
Riccardo Nuti - November 14th, 2025
On 10 November 2022, the European Parliament, by a large majority, approved the NIS2 (Network and Information System Security) Directive with its publication in the Official Journal of the European...

Kraken Arrives: The New Ransomware That Assesses Your Environment to Inflict Maximum Damage
Redazione RHC - November 14th, 2025
Cisco Talos researchers have detected an active wave of attacks using a new ransomware called Kraken. The group began operating in February 2025 and uses double-extortion methods, without targeting specific...

North Korea reorganizes its intelligence with a new agency
Redazione RHC - November 14th, 2025
North Korea has restructured its intelligence hierarchy, transforming the former Intelligence Agency into a structure with a much broader mandate. The new body, called the General Intelligence Directorate (GIRD), brings...

Cognitive Biases and Cybersecurity: The Fatal Fallacy of “I Have Nothing to Hide”
Fabrizio Saviano - November 14th, 2025
In Italy, over 3,000 people lose their lives on the roads every year, despite everyone knowing basic safety rules. In cybercrime, the scenario isn't all that different: millions of victims...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

