Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
320×100
Fortinet 970x120px

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
WhatsApp Blocked in Russia: Messaging App Faces Crackdown
Di Redazione RHC - 28/11/2025

The Russian Federation’s Roskomnadzor has announced that it continues to impose systematic restrictions on the messaging app WhatsApp due to violations of Russian law. According to the agency, the s...

Immagine del sito
Shai-Hulud Worm Spreads Beyond npm, Attacks Maven
Di Redazione RHC - 28/11/2025

The Shai-Hulud worm has spread beyond the npm ecosystem and was discovered in Maven . Socket specialists noticed an infected package on Maven Central containing the same malicious components used in t...

Immagine del sito
11.7% of jobs could be replaced by artificial intelligence
Di Redazione RHC - 28/11/2025

Artificial intelligence is currently capable of performing work equivalent to 11.7% of US employment . And not just in theory: in terms of monetary value, this value is already comparable to the salar...

Immagine del sito
Tor Boosts Security with Counter Galois Onion CGO Encryption
Di Redazione RHC - 27/11/2025

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

Immagine del sito
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Di Redazione RHC - 26/11/2025

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

How to Start a Cyber Security Program: The First Steps

Cybersecurity has become a crucial component for protecting corporate information and sensitive data. Starting a cybersecurity program is not only a n...
Redazione RHC - 20/07/2025 - 10:54

What are Side Channel Attacks? How they work and how to defend data from cyber threat physics.

Side Channel Attacks represent a sophisticated category of cyber threats that focus on weaknesses in security systems. These attacks differ from tr...
Redazione RHC - 20/07/2025 - 10:51

What is Phishing as a Service (PaaS). Let’s explore cybercrime services and access some underground resources.

"Phishing as a service" (PaaS) is a type of service offered by cybercriminals or illicit service providers that simplifies and automates the entire pr...
Redazione RHC - 20/07/2025 - 10:49

What is a False Flag in Cybersecurity: From its Origins to Its Use in Malware and National Security Attacks

In the vast world of cybersecurity, an often controversial and highly intriguing practice is that of "false flags." This term, originally used in ...
Redazione RHC - 20/07/2025 - 10:48

Chinese humanoid robot replaces its own battery and works 24 hours a day

The presentation of the Walker S2 represents a major step forward in the operational autonomy of humanoid robots. Thanks to the ability to autonomousl...
Redazione RHC - 20/07/2025 - 10:44

Gmail introduces Shielded Email. Temporary email to fight spam and protect your privacy.

Google continues to actively develop Gmail, adding new features with elements of artificial intelligence to the email service. These updates make usin...
Redazione RHC - 19/07/2025 - 21:21

How to Start a Cyber Security Program: The First Steps

- July 19th, 2025

Cybersecurity has become a crucial component for protecting corporate information and sensitive data. Starting a cybersecurity program is not only a necessity, but a must for any organization that wants...

Facebook Linkedin X

What are Side Channel Attacks? How they work and how to defend data from cyber threat physics.

- July 19th, 2025

Side Channel Attacks represent a sophisticated category of cyber threats that focus on weaknesses in security systems. These attacks differ from traditional techniques based on brute force or software vulnerabilities,...

Facebook Linkedin X

What is Phishing as a Service (PaaS). Let’s explore cybercrime services and access some underground resources.

- July 19th, 2025

"Phishing as a service" (PaaS) is a type of service offered by cybercriminals or illicit service providers that simplifies and automates the entire process of creating and distributing phishing attacks...

Facebook Linkedin X

What is a False Flag in Cybersecurity: From its Origins to Its Use in Malware and National Security Attacks

- July 19th, 2025

In the vast world of cybersecurity, an often controversial and highly intriguing practice is that of "false flags." This term, originally used in the context of military operations and intelligence,...

Facebook Linkedin X

Chinese humanoid robot replaces its own battery and works 24 hours a day

- July 19th, 2025

The presentation of the Walker S2 represents a major step forward in the operational autonomy of humanoid robots. Thanks to the ability to autonomously replace its own battery, the robot...

Facebook Linkedin X

Gmail introduces Shielded Email. Temporary email to fight spam and protect your privacy.

- July 18th, 2025

Google continues to actively develop Gmail, adding new features with elements of artificial intelligence to the email service. These updates make using email more convenient, but at the same time,...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE