Red Hot Cyber. The Cybersecurity Blog
Featured Articles

On November 13, Eurofiber France, a respected provider of fiber optic network and VPN solutions to many of France’s leading companies, discovered that its systems had been compromised by criminal ha...

This fall, we’ve had quite a bit of a cloud headache, I don’t know if you’ve noticed. That is, AWS, Azure , and then Cloudflare . All of them down, one after the other. A series of outages that ...

Users noticed that last week Microsoft developers disabled the offline activation method for Windows 11 and 10 via KMS38, which has been used by hackers around the world for years. However, the offici...

Group-IB experts presented a detailed analysis of the long-running UNC2891 campaign, which demonstrated the continuing sophistication of ATM attack schemes. Attention focused on the Raspberry Pi, whic...

Israeli company NSO Group has appealed a California federal court ruling that bars it from using WhatsApp’s infrastructure to distribute its Pegasus surveillance software. The case, which has been o...
The phenomenon of polarization on the internet: Hikikomori
From Likes to Depression: How Social Media Can Affect Our Mental Health
The US and Global Surveillance: Uncovering Section 702 of the Foreign Intelligence Surveillance Act
What is Cross-Site Scripting? An article to help you understand it in a simple way.
Spy Apps: How Spyware Works and Why It’s a Privacy Risk
Asus releases emergency firmware update for vulnerable DSL routers.

The phenomenon of polarization on the internet: Hikikomori
Daniela Farina - November 17th, 2025
Many still maintain that hikikomori is an exclusively Japanese phenomenon. Yet, scientifically, numerous studies now confirm the existence of cases similar in characteristics to Japanese hikikomori in Spain, France, Italy,...

From Likes to Depression: How Social Media Can Affect Our Mental Health
Daniela Farina - November 17th, 2025
Questioning changes as they occur is always a difficult, if not downright foolhardy, undertaking. Certainly, when the object of the investigation concerns the changes social media has wrought on individuals,...

The US and Global Surveillance: Uncovering Section 702 of the Foreign Intelligence Surveillance Act
Aniello Giugliano - November 17th, 2025
Privacy in the United States is a constant topic of debate, especially in the digital age. The Supreme Court has played a central role in interpreting the Fourth Amendment, which...

What is Cross-Site Scripting? An article to help you understand it in a simple way.
Davide Cavallini - November 17th, 2025
Author : Davide Cavallini Today I will try to use the same dialectic ( as previously done in the article on SQL injection ), and explain in a simple way...

Spy Apps: How Spyware Works and Why It’s a Privacy Risk
Redazione RHC - November 17th, 2025
Spyware (also known as spy apps) represent one of the most insidious and dangerous threats of the digital age. These are malicious programs designed to infiltrate a user's device, collecting...

Asus releases emergency firmware update for vulnerable DSL routers.
Redazione RHC - November 17th, 2025
Asus has released an emergency firmware update for several DSL router models. The patch addresses a critical vulnerability that allows attackers to take complete control of devices without authentication. The...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

