Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
LECS 320x100 1
970x120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Di Redazione RHC - 26/11/2025

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Immagine del sito
Investment Scam Alert: How to Avoid Losing Thousands
Di Redazione RHC - 26/11/2025

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

Immagine del sito
Malware Uses Finger Command to Infect Windows Devices
Di Redazione RHC - 26/11/2025

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

Immagine del sito
The AGI Revolution: How Mark Gubrud’s Term Changed Tech Forever
Di Redazione RHC - 25/11/2025

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...

Immagine del sito
Anthropic Releases Claude Opus 4.5: AI Model for Enhanced Productivity
Di Redazione RHC - 24/11/2025

Anthropic has released Claude Opus 4.5 , its new flagship model, which the company says is the most powerful version yet and ranks at the top of the class for practical programming, agent-based produc...

Cognitive Biases and Cybersecurity: The Fatal Fallacy of “I Have Nothing to Hide”

In Italy, over 3,000 people lose their lives on the roads every year, despite everyone knowing basic safety rules. In cybercrime, the scenario isn't a...
Fabrizio Saviano - 15/11/2025 - 12:39

Did they give you a digital photo frame? It’s more than just family memories.

Researchers have discovered several critical vulnerabilities in Uhale digital picture frames running Android , with some models even downloading and e...
Redazione RHC - 15/11/2025 - 12:38

What are PsyOps? Exploring mind manipulation in the digital age.

Psychological operations, commonly known as PsyOps, are a significant and often poorly understood element of military and security strategy . These op...
Redazione RHC - 15/11/2025 - 11:10

Understanding Firewalls: The First Line of Defense in Cybersecurity

In the world of cybersecurity, firewalls are the first line of defense against cyber threats and attacks. Every day, businesses and home users are exp...
Redazione RHC - 15/11/2025 - 11:03

Critical Vulnerability in FortiWeb: Fortinet and CISA Recommend Urgent Updates

Fortinet has confirmed the discovery of a critical relative path vulnerability (CWE-23) in FortiWeb devices, identified as CVE-2025-64446 and register...
Redazione RHC - 15/11/2025 - 10:54

China’s New Era of Robots: Shenzhen at the Center of the Technological Revolution

The 15th Chinese National Games opened with a spectacle that combined sport and technology. Among the highlights were robots capable of playing ancien...
Redazione RHC - 15/11/2025 - 10:33
1 14 15 16 17 18 255

Cognitive Biases and Cybersecurity: The Fatal Fallacy of “I Have Nothing to Hide”

- November 15th, 2025

In Italy, over 3,000 people lose their lives on the roads every year, despite everyone knowing basic safety rules. In cybercrime, the scenario isn't all that different: millions of victims...

Facebook Linkedin X

Did they give you a digital photo frame? It’s more than just family memories.

- November 15th, 2025

Researchers have discovered several critical vulnerabilities in Uhale digital picture frames running Android , with some models even downloading and executing malware during startup. They examined the Uhale app and...

Facebook Linkedin X

What are PsyOps? Exploring mind manipulation in the digital age.

- November 15th, 2025

Psychological operations, commonly known as PsyOps, are a significant and often poorly understood element of military and security strategy . These operations involve the use of psychological tactics to influence...

Facebook Linkedin X

Understanding Firewalls: The First Line of Defense in Cybersecurity

- November 15th, 2025

In the world of cybersecurity, firewalls are the first line of defense against cyber threats and attacks. Every day, businesses and home users are exposed to risks such as malware,...

Facebook Linkedin X

Critical Vulnerability in FortiWeb: Fortinet and CISA Recommend Urgent Updates

- November 15th, 2025

Fortinet has confirmed the discovery of a critical relative path vulnerability (CWE-23) in FortiWeb devices, identified as CVE-2025-64446 and registered as IR Number FG-IR-25-910 . The flaw, published on November...

Facebook Linkedin X

China’s New Era of Robots: Shenzhen at the Center of the Technological Revolution

- November 15th, 2025

The 15th Chinese National Games opened with a spectacle that combined sport and technology. Among the highlights were robots capable of playing ancient bronze instruments, artificial intelligence systems capable of...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE