Red Hot Cyber. The Cybersecurity Blog
Featured Articles

Gartner analysts have urged businesses to temporarily stop using browsers with built-in artificial intelligence (AI) capabilities . In a recent advisory, the company emphasizes that such tools pose un...

A critical vulnerability affecting the FortiOS, FortiWeb, FortiProxy , and FortiSwitchManager product lines has been reported by Fortinet via an urgent security advisory. This advisory was issued in c...

It seems the White House isn’t entirely clear … at least judging by yet another change of heart regarding the sale of Nvidia’s advanced chips to China, with the Trump administration having decid...

According to a recently released report by the Financial Crimes Enforcement Network (FinCEN) , global ransomware activity peaked in 2023, only to plummet in 2024. This decline is attributed to success...

Despite significant geopolitical challenges, the mercenary spyware industry remains a resilient and persistent threat; in this context, the well-known vendor Intellexa continues to expand its arsenal....
OWASP Top 10 2025: New Web Application Threats, Supply Chain Top Three
The dark web isn’t selling your data. You’re the one putting it up for sale every day!
Attack Techniques: What is a Command and Control (C2) Server?
New Penetration Testing Methods: Adversary Emulation and the Importance of a Non-Technological Approach to Corporate Security
Cyber Incident Mitigation Guide: The First Steps
Let’s find out what cyber insurance is. It insures your online business, but not only that.

OWASP Top 10 2025: New Web Application Threats, Supply Chain Top Three
Redazione RHC - November 11th, 2025
After four years, OWASP has updated its TOP 10 list of the most dangerous web application risks, adding two new categories and revising the ranking structure. The organization has released...

The dark web isn’t selling your data. You’re the one putting it up for sale every day!
Stefano Gazzella - November 11th, 2025
Unfortunately, personal data is a highly attractive and valuable market for cybercriminals, for reasons that are not at all difficult to imagine . We're not just talking about scams or...

Attack Techniques: What is a Command and Control (C2) Server?
Redazione RHC - November 10th, 2025
Among the many strategies used by attackers, one of the most insidious is represented by Command and Control (C2) Servers. We often discuss them on the pages of RHC, but...

New Penetration Testing Methods: Adversary Emulation and the Importance of a Non-Technological Approach to Corporate Security
Sandro Sana - November 10th, 2025
In the ever-evolving digital world, cybersecurity threats are becoming increasingly sophisticated and pervasive. Companies in every industry face a growing challenge in protecting their sensitive data and customer information. In...

Cyber Incident Mitigation Guide: The First Steps
Ricardo Nardini - November 10th, 2025
By definition, a security incident occurs when a computer system, network, or the data contained within them is compromised, breached, or damaged by malicious or unauthorized activity. These incidents can...

Let’s find out what cyber insurance is. It insures your online business, but not only that.
Redazione RHC - November 10th, 2025
The digital world is constantly evolving, and with the growth of online activity, protecting your business from potential cyber threats has become increasingly important. Cyber insurance is a form of...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

