Red Hot Cyber. The Cybersecurity Blog

Breadcrumbing: Understanding Emotional Manipulation to Better Defend Yourself in the Digital Domain
This article aims to explore the phenomenon of breadcrumbing from a psychological perspective, metaphorically linking it to the insidious strategies that attackers use in cybersecurity. We will discover how understanding human relational dynamics can offer us valuable tools to defend

Connected and Vulnerable: How to Secure OT and ICS in 2025
In today’s interconnected world, cybersecurity is not just about protecting information. Today, most devices and physical tools are connected to the network in some way. Whether for its structural operation or for remote maintenance or monitoring activities, all the tools

Darkcloux 3.0 is here: Securonis Linux becomes more secure (and more extreme) than ever
Securonis Linux has released its most significant update: version 3.0 of “Darkcloux” and the 3.0-r1 patch. The release includes new utilities, redesigned components, and improvements to privacy and security. The main change is the end of support for the GNOME environment. From

Urobot watches you while you pee (but it’s for your own good)
A Taiwanese hospital is testing Urobot, a smart urinal that instantly analyzes urine and emails the results. Although the device is designed in a “cute” style, social media users have noted that it looks scary and causes discomfort to patients.

Smart TV or Living Room Spies? Here’s How They’re Monitoring You
Many owners of smart TV operating systems are increasingly finding themselves caught in a conflict that rages between the desire to preserve viewer privacy and pressure from the advertising industry. The point is that TV manufacturers and embedded software developers

Massive Windows Crash: The OpenVPN Flaw That Can Knock Out Infrastructures
A critical vulnerability has been discovered in the OpenVPN data channel offload driver for Windows, which can be exploited by local attackers to crash systems. The bug, classified as CVE-2025-50054, is a buffer overflow that affects 1.3.0 and earlier versions

$200 for Access to an Italian Company! While the Dark Web is doing business, are you ready to defend yourself?
Redazione RHC - June 24th, 2025
Following the case of the 568 endpoints of an Italian industrial machinery company, another compromised access related to an Italian software engineering company has ended up for sale on an underground forum...

“Cleaning Up” Windows Update! Microsoft Declares War on Drivers Exploited in Ransomware Attacks
Redazione RHC - June 24th, 2025
Microsoft announced that it will periodically remove outdated drivers from the Windows Update Catalog to reduce risk and improve compatibility. "The goal of this initiative is to provide the best set of...

Cyberspace: The Invisible Thread Between War and Peace
Redazione RHC - June 23rd, 2025
How Iran-Israel’s Digital War Redefines Security, Diplomacy, and the Global Future? Since June 12, a 700% increase in cyber activity has been detected, resulting in a wave of DDoS attacks,...

Kill Switch! Donald Trump’s Digital Weapon Threatening Europe
Redazione RHC - June 23rd, 2025
Donald Trump's return to the White House has becomea painful reminder for Europe of its main digital vulnerability: the "kill switch" effectively controlled by the United States. Political risks that...
Sign up for the newsletter