Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Heliaca 970x120 1
Precedente Successivo

Latest news

Attack Techniques: What is a Command and Control (C2) Server? Cyber News

Attack Techniques: What is a Command and Control (C2) Server?

Among the many strategies used by attackers, one of the most insidious is represented by Command and Control (C2) Servers....
Sandro Sana - November 11, 2025
New Penetration Testing Methods: Adversary Emulation and the Importance of a Non-Technological Approach to Corporate Security Culture

New Penetration Testing Methods: Adversary Emulation and the Importance of a Non-Technological Approach to Corporate Security

In the ever-evolving digital world, cybersecurity threats are becoming increasingly sophisticated and pervasive. Companies in every industry face a growing...
Sandro Sana - November 11, 2025
Cyber Incident Mitigation Guide: The First Steps Cybercrime

Cyber Incident Mitigation Guide: The First Steps

By definition, a security incident occurs when a computer system, network, or the data contained within them is compromised, breached,...
Ricardo Nardini - November 11, 2025
Let’s find out what cyber insurance is. It insures your online business, but not only that. Cyber News

Let’s find out what cyber insurance is. It insures your online business, but not only that.

The digital world is constantly evolving, and with the growth of online activity, protecting your business from potential cyber threats...
Agostino Pellegrino - November 11, 2025
Let’s find out what Business Impact Analysis (BIA) is Cyber News

Let’s find out what Business Impact Analysis (BIA) is

Business Impact Analysis (BIA) is a fundamental tool for ensuring business continuity. BIA helps organizations identify activities critical to their...
Redazione RHC - November 11, 2025
What is risk analysis in ICT Risk Management? Cyber News

What is risk analysis in ICT Risk Management?

Risk analysis is an important process in the context of ICT Risk Management as it allows us to evaluate the...
Redazione RHC - November 11, 2025

Blade Runner Already Predicted Deepfake! Cyber Lessons from Film Classics

“ Art is a mirror that reflects the soul of the beholder.” This quote, which captures the essence of our experience with cinema, takes on crucial significance when discussing cybersecurity....

The freebie party is over! Open source infrastructure is at risk and needs funding.

An open letter signed by major open source foundations has raised the alarm about the future of the infrastructure that supports modern software development. The Open Source Security Foundation (OpenSSF),...

Zero-Day Vulnerabilities Found in Cisco IOS and IOS XE: Urgent Updates

Cisco has disclosed a zero-day vulnerability, tracked as CVE-2025-20352, in its widely used IOS and IOS XE software; this vulnerability appears to be actively exploited. This vulnerability was initially identified...

Artificial Intelligence: A Double-Edged Sword in Digital Security

Artificial intelligence is increasingly being described as a double-edged sword, capable of offering enormous advantages but also opening new avenues for digital crime. During the " TRUST AICS - 2025"...

CrowdStrike: Cybersecurity Enters the Age of AI Agents

At Fal.Con 2025, the annual conference that brings together thousands of cybersecurity experts from around the world, CrowdStrike made one thing clear: cyber defense is entering a new era, that...

Violent social media and video games: the new ticking time bomb for teens.

The uncontrolled use of social media and violent video games poses a growing threat to adolescents at a crucial stage of their development. Child and adolescent health experts warn that...

TikTok, the app setting the US ablaze: billion-dollar deal for total control

TikTok's fate in the United States is now inextricably linked to political negotiations. The White House has announced that the service's recommendation algorithm will be replicated and adapted solely based...

Supply Chain: The blockade of European airports raises concerns about an increasingly critical issue.

On September 20, 2025, a cyberattack hit three of Europe's major airports: London Heathrow, Brussels, and Berlin. The digital systems governing check-in and baggage handling were rendered unusable, resulting in...

Dedigitalization: Japanese city of Toyoda restricts smartphone use

In the Japanese city of Toyoda (Aichi Prefecture), city council members approved a draft ordinance limiting smartphone use during leisure time . The document establishes a daily limit of two...

ShadowV2: New MaaS botnet for DDoS attacks uses containers

Amid growing criminal activity, Darktrace has uncovered a new campaign using the ShadowV2 botnet. Researchers detected malicious activity on June 24, 2025, when their honeypots were activated. This system relies...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE