Red Hot Cyber. The Cybersecurity Blog
Featured Articles

Gartner analysts have urged businesses to temporarily stop using browsers with built-in artificial intelligence (AI) capabilities . In a recent advisory, the company emphasizes that such tools pose un...

A critical vulnerability affecting the FortiOS, FortiWeb, FortiProxy , and FortiSwitchManager product lines has been reported by Fortinet via an urgent security advisory. This advisory was issued in c...

It seems the White House isn’t entirely clear … at least judging by yet another change of heart regarding the sale of Nvidia’s advanced chips to China, with the Trump administration having decid...

According to a recently released report by the Financial Crimes Enforcement Network (FinCEN) , global ransomware activity peaked in 2023, only to plummet in 2024. This decline is attributed to success...

Despite significant geopolitical challenges, the mercenary spyware industry remains a resilient and persistent threat; in this context, the well-known vendor Intellexa continues to expand its arsenal....
Businesses are going bankrupt due to ransomware. Small and medium-sized businesses, beware!
What is ransomware? Let’s explore how RaaS works and what it means.
The Shellter Elite suite used by Red Teams to bypass EDRs is now being used by cybercrime
Is the end of state-led cyberspace invasions coming? The 56-page draft prepared by the UN
Claude Shannon: Father of Cryptography and Founder of the Information Age
Who are the most famous hackers in history?

Businesses are going bankrupt due to ransomware. Small and medium-sized businesses, beware!
Redazione RHC - July 8th, 2025
Very often on RHC, we talk about cyber attacks and ransomware. But this time, we want to go further. We want to talk about the companies that didn't make it,...

What is ransomware? Let’s explore how RaaS works and what it means.
Redazione RHC - July 8th, 2025
Many people often want to understand the ransomware phenomenon precisely, its meaning, the methods of violation, and the crime that revolves around it, struggling to find information scattered across thousands...

The Shellter Elite suite used by Red Teams to bypass EDRs is now being used by cybercrime
Redazione RHC - July 8th, 2025
Shellter Project, maker of a commercial downloader for bypassing antivirus and EDR systems, has reported that hackers are using its Shellter Elite product for attacks. This is because one of...

Is the end of state-led cyberspace invasions coming? The 56-page draft prepared by the UN
Redazione RHC - July 8th, 2025
The eleventh final session of the Open-Ended Working Group (OEWG) on cybersecurity opened at the United Nations Headquarters in New York on July 7. The group was created in 2019...

Claude Shannon: Father of Cryptography and Founder of the Information Age
Carlo Denza - July 7th, 2025
Whoever has as a mission, to deal with computer security and therefore also with cryptography, must necessarily pass through the figures of two giants of the last century. We are...

Who are the most famous hackers in history?
Redazione RHC - July 7th, 2025
We often talk about hackers, but who are the famous hackers that ever existed? Considered by many as eccentric geniuses and computer wizards, by others they have the appearance of...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

