Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
320×100
970x20 Itcentric

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Virtual Private Network (VPN): What It Is, How It Works, and Why
Di Redazione RHC - 15/11/2025

A VPN , short for Virtual Private Network, is a system that allows you to establish a secure and private connection over a public network, such as the Internet . In practice, it creates what is called...

Immagine del sito
Password Managers: A Complete Guide to Choosing and Using Them
Di Redazione RHC - 15/11/2025

Passwords: how important are they in our digital lives? How many times have we reported this on our pages? Most digital activities— from social media to banking to online shopping —require unique ...

Immagine del sito
Discovering the NIS2 Directive: Security and Resilience of Digital Systems in the European Union
Di Riccardo Nuti - 15/11/2025

On 10 November 2022, the European Parliament, by a large majority, approved the NIS2 (Network and Information System Security) Directive with its publication in the Official Journal of the European Un...

Immagine del sito
Kraken Arrives: The New Ransomware That Assesses Your Environment to Inflict Maximum Damage
Di Redazione RHC - 15/11/2025

Cisco Talos researchers have detected an active wave of attacks using a new ransomware called Kraken. The group began operating in February 2025 and uses double-extortion methods, without targeting sp...

Immagine del sito
Understanding Firewalls: The First Line of Defense in Cybersecurity
Di Redazione RHC - 15/11/2025

In the world of cybersecurity, firewalls are the first line of defense against cyber threats and attacks. Every day, businesses and home users are exposed to risks such as malware, ransomware, and una...

Huawei launches data center AI card: Atlas 300I DUO, dual GPU, 140 TFLOPS

On October 19, Gamers Nexus revealed details of the Huawei Atlas 300I DUO , a dual-core AI inference card designed for intelligent computing in data c...
Redazione RHC - 21/10/2025 - 14:53

Critical vulnerability in Windows SMB client: CISA raises alarm

On October 20, 2025, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an urgent alert regarding a critical vulnerability, CVE-2...
Redazione RHC - 21/10/2025 - 08:04

Data Anonymization: Protecting Privacy Without Losing Utility

In an era where personal data is being produced and shared on a massive, daily basis, the concept of anonymization takes on a central role in the deba...
Aniello Giugliano - 21/10/2025 - 08:03

NIS2 and new ACN guidelines: what changes for companies and how to prepare

The European NIS2 directive represents a turning point for cybersecurity in Italy and Europe, imposing new responsibilities on public and private orga...
Redazione RHC - 21/10/2025 - 07:36

RHC’s HackerHood Reveals Two New 0days on Zyxel Products

Security researcher Alessandro Sgreccia , a member of Red Hot Cyber’s HackerHood team, has reported two new vulnerabilities to Zyxel affecting several...
Redazione RHC - 21/10/2025 - 07:36

F5 BIG-IP Vulnerability: 266,000 Devices at Risk Worldwide! 2,500 in Italy

The Cybersecurity and Infrastructure Security Agency (CISA) and the Multi-State Information Sharing & Analysis Center (MS-ISAC) are issuing this J...
Redazione RHC - 20/10/2025 - 14:44
1 43 44 45 46 47 242

Huawei launches data center AI card: Atlas 300I DUO, dual GPU, 140 TFLOPS

- October 21st, 2025

On October 19, Gamers Nexus revealed details of the Huawei Atlas 300I DUO , a dual-core AI inference card designed for intelligent computing in data centers. It is a single-slot...

Facebook Linkedin X

Critical vulnerability in Windows SMB client: CISA raises alarm

- October 21st, 2025

On October 20, 2025, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an urgent alert regarding a critical vulnerability, CVE-2025-33073, in Microsoft's Windows SMB client. This flaw, characterized by...

Facebook Linkedin X

Data Anonymization: Protecting Privacy Without Losing Utility

- October 21st, 2025

In an era where personal data is being produced and shared on a massive, daily basis, the concept of anonymization takes on a central role in the debate on privacy...

Facebook Linkedin X

NIS2 and new ACN guidelines: what changes for companies and how to prepare

- October 21st, 2025

The European NIS2 directive represents a turning point for cybersecurity in Italy and Europe, imposing new responsibilities on public and private organizations in managing cyber risks. To support the compliance...

Facebook Linkedin X

RHC’s HackerHood Reveals Two New 0days on Zyxel Products

- October 21st, 2025

Security researcher Alessandro Sgreccia , a member of Red Hot Cyber’s HackerHood team, has reported two new vulnerabilities to Zyxel affecting several devices from the ZLD (ATP/USG) family. Alessandro Sgreccia...

Facebook Linkedin X

F5 BIG-IP Vulnerability: 266,000 Devices at Risk Worldwide! 2,500 in Italy

- October 20th, 2025

The Cybersecurity and Infrastructure Security Agency (CISA) and the Multi-State Information Sharing & Analysis Center (MS-ISAC) are issuing this Joint Cybersecurity Advisory (CSA) in response to the active exploitation of...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE