Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Cyber Offensive Fundamentals 970x120 V0.1
Precedente Successivo

Latest news

US Allows Nvidia to Sell Advanced AI Chips to China, Easing Export Restrictions Cyber News

US Allows Nvidia to Sell Advanced AI Chips to China, Easing Export Restrictions

It seems the White House isn't entirely clear ... at least judging by yet another change of heart regarding the...
Redazione RHC - December 9, 2025
Taiwan Cracks Down on Submarine Cable Sabotage with New Laws Cyber News

Taiwan Cracks Down on Submarine Cable Sabotage with New Laws

In recent years, Taiwan's underwater infrastructure—electricity cables, gas pipelines, and water systems—has been damaged on several occasions, particularly communications cables....
Sandro Sana - December 9, 2025
Ransomware Attacks Decline in 2024, But Threat Remains High with $734M in Ransom Cybercrime

Ransomware Attacks Decline in 2024, But Threat Remains High with $734M in Ransom

According to a recently released report by the Financial Crimes Enforcement Network (FinCEN) , global ransomware activity peaked in 2023,...
Pietro Melillo - December 9, 2025
Embracing Vulnerability for Authentic Leadership and Team Growth Cybercrime

Embracing Vulnerability for Authentic Leadership and Team Growth

We're connected, connected to everything, hyperconnected. Our professional and social lives are dictated by extremely tight deadlines and a constantly...
Daniela Linda - December 9, 2025
CISA Warns: Avoid Personal VPNs for Secure Mobile Communications Cyber News

CISA Warns: Avoid Personal VPNs for Secure Mobile Communications

In new mobile communications advisories, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a stern warning to smartphone...
Massimiliano Brolli - December 9, 2025
Passwordless Authentication: The Future of Secure Online Access Cyber News

Passwordless Authentication: The Future of Secure Online Access

Using passwords to access online accounts is no longer as secure as it once was. In fact, passwords are now...
Pietro Melillo - December 9, 2025

LLM: Wikipedia Parasites: The Importance of Humanity in the Age of Artificial Intelligence

In the age of rapid advances in artificial intelligence, Wikipedia's importance as a reliable source of knowledge has become particularly significant. While neural networks generate text, images, and videos, their...

The dark web isn’t selling your data. You’re the one putting it up for sale every day!

Unfortunately, personal data is a highly attractive and valuable market for cybercriminals, for reasons that are not at all difficult to imagine . We're not just talking about scams or...

Attack Techniques: What is a Command and Control (C2) Server?

Among the many strategies used by attackers, one of the most insidious is represented by Command and Control (C2) Servers. We often discuss them on the pages of RHC, but...

New Penetration Testing Methods: Adversary Emulation and the Importance of a Non-Technological Approach to Corporate Security

In the ever-evolving digital world, cybersecurity threats are becoming increasingly sophisticated and pervasive. Companies in every industry face a growing challenge in protecting their sensitive data and customer information. In...

Cyber Incident Mitigation Guide: The First Steps

By definition, a security incident occurs when a computer system, network, or the data contained within them is compromised, breached, or damaged by malicious or unauthorized activity. These incidents can...

Let’s find out what cyber insurance is. It insures your online business, but not only that.

The digital world is constantly evolving, and with the growth of online activity, protecting your business from potential cyber threats has become increasingly important. Cyber insurance is a form of...

Let’s find out what Business Impact Analysis (BIA) is

Business Impact Analysis (BIA) is a fundamental tool for ensuring business continuity. BIA helps organizations identify activities critical to their operations, the risks associated with those activities, and the impacts...

What is risk analysis in ICT Risk Management?

Risk analysis is an important process in the context of ICT Risk Management as it allows us to evaluate the effectiveness of the technical countermeasures adopted to mitigate ICT risks....

Who invented the World Wide Web? The story of Timothy Berners-Lee, the genius behind the web

We all use the internet every day, at all hours, our smartphone has become an active prosthesis of our body, but have we ever wondered who invented the World Wide...

Marketing is nothing! VPNs sell themselves every time a government blocks adult sites

Hundreds of millions of smartphone users have faced blocking of pornographic websites and mandatory age verification. The UK has introduced mandatory identity verification on adult websites , and similar laws...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE