Red Hot Cyber. The Cybersecurity Blog
Featured Articles

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...

Anthropic has released Claude Opus 4.5 , its new flagship model, which the company says is the most powerful version yet and ranks at the top of the class for practical programming, agent-based produc...

On November 24, Alibaba announced Qwen3Max, which had been in public beta for a week , and had already surpassed 10 million downloads. It was a record that shattered all others. In a very short time, ...
The stress of social network algorithms causes burnout in creators
Discovering Tor Browser: The Digital Fortress for Online Privacy
Virtual Private Network (VPN): What It Is, How It Works, and Why
Rare Earths: What They Are and Why They Matter More Than Oil in Today’s World
Let’s discover injections explained in a simple way
A journey into the world of OT/ICS: What are SCADA servers?

The stress of social network algorithms causes burnout in creators
Redazione RHC - November 16th, 2025
A new research project has shown that the online content industry, which has offered people thousands of new ways to earn money, is also placing significant mental stress on its...

Discovering Tor Browser: The Digital Fortress for Online Privacy
Raffaela Crisci - November 15th, 2025
Tor Browser (short for The Onion Router) is a free, open-source web browser designed specifically to protect users' online privacy. Using a network of servers distributed around the world, Tor...

Virtual Private Network (VPN): What It Is, How It Works, and Why
Redazione RHC - November 15th, 2025
A VPN , short for Virtual Private Network, is a system that allows you to establish a secure and private connection over a public network, such as the Internet ....

Rare Earths: What They Are and Why They Matter More Than Oil in Today’s World
Redazione RHC - November 15th, 2025
We often hear about the so-called "Rare Earths". This is a set of seventeen metallic elements. These include the fifteen lanthanides on the periodic table , plus scandium and yttrium...

Let’s discover injections explained in a simple way
Davide Cavallini - November 15th, 2025
Good morning everyone. I'm Davide Cavallini, a web developer and penetration tester. Today I'm going to talk about injections. There are various types, but what does it conceptually mean to...

A journey into the world of OT/ICS: What are SCADA servers?
Redazione RHC - November 15th, 2025
The world of OT (Operational Technology) and ICS (Industrial Control Systems) is closely related to SCADA (Supervisory Control and Data Acquisition) systems. In industrial automation, SCADA systems play a fundamental...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

