Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
TM RedHotCyber 320x100 042514
Crowdtour Promo Banner For Milan V1 970x120 Desktop

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
The Intel 386 processor turns 40: the 32-bit era began
Di Redazione RHC - 20/10/2025

October 20, 2025, marks a significant anniversary in the history of computing: the Intel 80386 processor, also known as the i386 , celebrates its 40th birthday . And it’s a big birthday! Launche...

Immagine del sito
Intel releases urgent patches for new Spectre variant
Di Redazione RHC - 19/10/2025

VUSec researchers have presented a paper titled “Training Solo,” which challenges the fundamental principles of protection against Spectre-v2 attacks. Previously , the domain isolation mec...

Immagine del sito
Famous hackers: Vladimir Levin and the first online bank robbery.
Di Redazione RHC - 18/10/2025

Today we’ll meet another hacker from the past. He’s Vladimir Levin, a Russian hacker from St. Petersburg (Владимир Леонидович Левин), who became famous for breaking ...

Immagine del sito
Cyber Attack on European Airports: Everest Ransomware Claims Claim
Di Redazione RHC - 18/10/2025

On September 20, we reported on a cyberattack that paralyzed several European airports, including Brussels, Berlin, and London Heathrow. This was a supply chain attack that exploited the compromise of...

Immagine del sito
Inmates hack prison: sentences reduced, funds transferred, and unauthorized visits
Di Redazione RHC - 18/10/2025

The Romanian penitentiary system has found itself at the center of a major digital scandal: inmates in Târgu Jiu hacked the PNA’s internal platform and, for several months, managed data on pris...

What is Social Engineering? Uncovering an increasingly pervasive threat.

Social engineering is a psychological manipulation technique used to gain unauthorized access or information. Attackers exploit people's natural tende...
Redazione RHC - 19/07/2025 - 09:57

The World of Cybercrime: From Profit-Seeking Criminals to Hacktivists and State-Owned Hackers

The increasingly widespread use of digital technologies has opened up new opportunities for cybercriminals operating online, giving rise to a veritabl...
Redazione RHC - 19/07/2025 - 09:55

What is cyber hacktivism? History, motivations, hacking, consequences, and evolution.

The term "hacktivism" is a combination of the English terms "hacking" and "hacktivism" and was coined to describe the use of computer hacking for poli...
Redazione RHC - 19/07/2025 - 09:51

Disloyal employees. Let’s find out who they are and how to protect ourselves from this growing threat.

In the digital age, cybersecurity is a critical issue for any company handling sensitive data. However, not all risks are external. In fact, employees...
Redazione RHC - 19/07/2025 - 09:48

Bullying and cyberbullying: what it is and how to protect yourself.

News reports are highlighting an ever-increasing number of cases of cyberbullying, some with dramatic outcomes (see incitement to suicide). Cyberbully...
Redazione RHC - 19/07/2025 - 09:47

What is Electronic Warfare (EW). Superiority in the Electromagnetic Spectrum

Electronic Warfare (EW) is one of the most sophisticated and strategically relevant disciplines in modern security. In an age dominated by technology,...
Redazione RHC - 19/07/2025 - 09:45

What is Social Engineering? Uncovering an increasingly pervasive threat.

- July 19th, 2025

Social engineering is a psychological manipulation technique used to gain unauthorized access or information. Attackers exploit people's natural tendency to rely on trust and courtesy to convince them to provide...

Facebook Linkedin X

The World of Cybercrime: From Profit-Seeking Criminals to Hacktivists and State-Owned Hackers

- July 19th, 2025

The increasingly widespread use of digital technologies has opened up new opportunities for cybercriminals operating online, giving rise to a veritable cybercrime ecosystem. In this context, various actors can jeopardize...

Facebook Linkedin X

What is cyber hacktivism? History, motivations, hacking, consequences, and evolution.

- July 19th, 2025

The term "hacktivism" is a combination of the English terms "hacking" and "hacktivism" and was coined to describe the use of computer hacking for political or social purposes. It is...

Facebook Linkedin X

Disloyal employees. Let’s find out who they are and how to protect ourselves from this growing threat.

- July 19th, 2025

In the digital age, cybersecurity is a critical issue for any company handling sensitive data. However, not all risks are external. In fact, employees themselves often pose a threat to...

Facebook Linkedin X

Bullying and cyberbullying: what it is and how to protect yourself.

- July 19th, 2025

News reports are highlighting an ever-increasing number of cases of cyberbullying, some with dramatic outcomes (see incitement to suicide). Cyberbullying is a new form of psychological violence, an invasion and...

Facebook Linkedin X

What is Electronic Warfare (EW). Superiority in the Electromagnetic Spectrum

- July 19th, 2025

Electronic Warfare (EW) is one of the most sophisticated and strategically relevant disciplines in modern security. In an age dominated by technology, where information superiority can decide the outcome of...

Facebook Linkedin X
Most Read Articles of the Month Most Read Articles of the Week
  1. The Truth About Windows XP License Key: FCKGW-RHQQ2-YXRKT-8TG6W-2B7Q8
  2. Computer science graduates with no future! Thousands of resumes ignored, and goodbye to six-figure salaries.
  3. With 50 dollars and physical access to the server, the Cloud goes to hell
  4. Shocking collapse: -71% of job offers for software engineers in three years
  5. Hackers hit the United States: critical federal infrastructure compromised
  1. WhatsApp Web in the crosshairs! How the worm that distributes the banking Trojan works
  2. “Double Bind” Leads to GPT-5 Jailbreak: The AI That Was Convinced It Was Schizophrenic
  3. F5 Suffers Security Breach: Source Code and Sensitive Data Stolen
  4. DAS: The world’s ear hidden in submarine cables
  5. ChatGPT writes the perfect scam… but the scammer leaves the AI instructions inside.

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE