Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Crowdstrike 320×100
970x120 Olympous

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Taiwan Cracks Down on Submarine Cable Sabotage with New Laws Cyber News

Taiwan Cracks Down on Submarine Cable Sabotage with New Laws

In recent years, Taiwan's underwater infrastructure—electricity cables, gas pipelines, and water systems—has been damaged on several occasions, particularly communications cables....
Redazione RHC - 9 December 2025
Ransomware Attacks Decline in 2024, But Threat Remains High with $734M in Ransom Cyber crime

Ransomware Attacks Decline in 2024, But Threat Remains High with $734M in Ransom

According to a recently released report by the Financial Crimes Enforcement Network (FinCEN) , global ransomware activity peaked in 2023,...
Pietro Melillo - 9 December 2025
Embracing Vulnerability for Authentic Leadership and Team Growth Cyber crime

Embracing Vulnerability for Authentic Leadership and Team Growth

We're connected, connected to everything, hyperconnected. Our professional and social lives are dictated by extremely tight deadlines and a constantly...
Daniela Linda - 9 December 2025
CISA Warns: Avoid Personal VPNs for Secure Mobile Communications Cyber News

CISA Warns: Avoid Personal VPNs for Secure Mobile Communications

In new mobile communications advisories, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a stern warning to smartphone...
Redazione RHC - 9 December 2025
SAP Security Update Fixes Critical Code Injection Vulnerability in Solution Manager Vulnerability

SAP Security Update Fixes Critical Code Injection Vulnerability in Solution Manager

SAP has just released its latest annual security update, which contains 14 new security bug fixes. Among them is a...
Agostino Pellegrino - 9 December 2025
Passwordless Authentication: The Future of Secure Online Access Cyber News

Passwordless Authentication: The Future of Secure Online Access

Using passwords to access online accounts is no longer as secure as it once was. In fact, passwords are now...
Redazione RHC - 9 December 2025

Are Black Hackers Demanding Ransom? Checkout.com Responds: We Fund Those Hunting You

Payment service Checkout.com was the victim of an extortion attempt: the ShinyHunters group claimed to have accessed company data and demanded a ransom. An investigation revealed that the attackers had...
Share on Facebook Share on LinkedIn Share on X

Trump, Hong Kong, and the Global Rush to Regulate Cryptocurrencies

Throughout 2024, there were several signs of a shift in the relationship between institutions and cryptocurrencies. On March 6, President Donald Trump signed an executive order establishing a "Bitcoin Strategic...
Share on Facebook Share on LinkedIn Share on X

Sam Altman and her husband Oliver and the dream of genetically modified children

The pursuit of immortality is a pervasive obsession in Silicon Valley. Likewise, the idea of perfecting children through genetic modification is another. Sam Altman, the man who brought artificial intelligence...
Share on Facebook Share on LinkedIn Share on X

The stress of social network algorithms causes burnout in creators

A new research project has shown that the online content industry, which has offered people thousands of new ways to earn money, is also placing significant mental stress on its...
Share on Facebook Share on LinkedIn Share on X

Discovering Tor Browser: The Digital Fortress for Online Privacy

Tor Browser (short for The Onion Router) is a free, open-source web browser designed specifically to protect users' online privacy. Using a network of servers distributed around the world, Tor...
Share on Facebook Share on LinkedIn Share on X

Virtual Private Network (VPN): What It Is, How It Works, and Why

A VPN , short for Virtual Private Network, is a system that allows you to establish a secure and private connection over a public network, such as the Internet ....
Share on Facebook Share on LinkedIn Share on X

Rare Earths: What They Are and Why They Matter More Than Oil in Today’s World

We often hear about the so-called "Rare Earths". This is a set of seventeen metallic elements. These include the fifteen lanthanides on the periodic table , plus scandium and yttrium...
Share on Facebook Share on LinkedIn Share on X

Let’s discover injections explained in a simple way

Good morning everyone. I'm Davide Cavallini, a web developer and penetration tester. Today I'm going to talk about injections. There are various types, but what does it conceptually mean to...
Share on Facebook Share on LinkedIn Share on X

A journey into the world of OT/ICS: What are SCADA servers?

The world of OT (Operational Technology) and ICS (Industrial Control Systems) is closely related to SCADA (Supervisory Control and Data Acquisition) systems. In industrial automation, SCADA systems play a fundamental...
Share on Facebook Share on LinkedIn Share on X

Quishing: What it is, how it works, and how to protect yourself

Quishing is an emerging form of cyberattack that combines traditional phishing with the use of QR codes , tools now familiar to many. The term " quishing " is a...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCyber News
NoName057(16) hits Italy 487 times in the last 3 months: the DDoS wave does not stop
Redazione RHC - 24/01/2026

Italy has confirmed itself as one of the main targets of the DDoS attack campaign carried out by the hacktivist group NoName057(16) . According to what was declared directly by the collective, our country has…

Immagine del sitoCyber News
NexPhone: Three operating systems in your pocket! The phone that challenges the very concept of a PC.
Redazione RHC - 23/01/2026

The question has been circulating for over ten years: can a smartphone really replace a computer? Over time, the industry has repeatedly attempted to provide a concrete answer, without ever reaching a definitive solution. From…

Immagine del sitoCyber News
BlueNoroff: The Hacker Group Revolutionizing Cybercrime
Redazione RHC - 23/01/2026

The BlueNoroff hacker group has long since transformed cybercrime into a high-tech business, with tens of millions of dollars, cryptocurrency assets, and entire financial ecosystems at stake. A report by Picus Security details the group’s…

Immagine del sitoCyber News
Nearly 2,000 bugs in 100 dating apps: How your data can be stolen
Redazione RHC - 23/01/2026

A study of 100 dating apps revealed a disturbing picture: nearly 2,000 vulnerabilities were detected, 17% of which were classified as critical. The analysis was conducted by AppSec Solutions. The study’s results were published by…

Immagine del sitoCyber News
MacSync: The macOS malware that empties your wallet… after weeks
Redazione RHC - 23/01/2026

A new malware campaign has emerged in the macOS world, one that relies not on sophisticated exploits, but on good old-fashioned social engineering. It’s powered by the MacSync malware, distributed using the ” malware-as-a-service ”…