Red Hot Cyber. The Cybersecurity Blog
Featured Articles

MITRE has released its ranking of the 25 most dangerous software vulnerabilities predicted for 2025, based on data collected through the National Vulnerability Database. These vulnerabilities were ide...

The prospect of a four-day workweek, with a resulting three-day long weekend, may not be far off. This is according to Christopher A. Pissarides , a British-Cypriot economist and Nobel Prize winner, w...

The recent 2025.4 release of Kali Linux has been made available to the public, introducing significant improvements to the GNOME, KDE, and Xfce desktop environments . From now on, Wayland will be the ...

An alleged database containing sensitive information on 18 million U.S. citizens over 65 has appeared for sale on a popular dark web forum. The advertiser, who uses the pseudonym “Frenshyny,” clai...

A recent study by Datadog Security Labs reveals an ongoing operation targeting organizations using Microsoft 365 and Okta for single sign-on (SSO) authentication. This operation uses sophisticated tec...
Rare Earths: What They Are and Why They Matter More Than Oil in Today’s World
Let’s discover injections explained in a simple way
A journey into the world of OT/ICS: What are SCADA servers?
Quishing: What it is, how it works, and how to protect yourself
Password Managers: A Complete Guide to Choosing and Using Them
Discovering the NIS2 Directive: Security and Resilience of Digital Systems in the European Union

Rare Earths: What They Are and Why They Matter More Than Oil in Today’s World
Redazione RHC - November 14th, 2025
We often hear about the so-called "Rare Earths". This is a set of seventeen metallic elements. These include the fifteen lanthanides on the periodic table , plus scandium and yttrium...

Let’s discover injections explained in a simple way
Davide Cavallini - November 14th, 2025
Good morning everyone. I'm Davide Cavallini, a web developer and penetration tester. Today I'm going to talk about injections. There are various types, but what does it conceptually mean to...

A journey into the world of OT/ICS: What are SCADA servers?
Redazione RHC - November 14th, 2025
The world of OT (Operational Technology) and ICS (Industrial Control Systems) is closely related to SCADA (Supervisory Control and Data Acquisition) systems. In industrial automation, SCADA systems play a fundamental...

Quishing: What it is, how it works, and how to protect yourself
Redazione RHC - November 14th, 2025
Quishing is an emerging form of cyberattack that combines traditional phishing with the use of QR codes , tools now familiar to many. The term " quishing " is a...

Password Managers: A Complete Guide to Choosing and Using Them
Redazione RHC - November 14th, 2025
Passwords: how important are they in our digital lives? How many times have we reported this on our pages? Most digital activities— from social media to banking to online shopping...

Discovering the NIS2 Directive: Security and Resilience of Digital Systems in the European Union
Riccardo Nuti - November 14th, 2025
On 10 November 2022, the European Parliament, by a large majority, approved the NIS2 (Network and Information System Security) Directive with its publication in the Official Journal of the European...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

