Red Hot Cyber. The Cybersecurity Blog
Featured Articles

Group-IB experts presented a detailed analysis of the long-running UNC2891 campaign, which demonstrated the continuing sophistication of ATM attack schemes. Attention focused on the Raspberry Pi, whic...

Israeli company NSO Group has appealed a California federal court ruling that bars it from using WhatsApp’s infrastructure to distribute its Pegasus surveillance software. The case, which has been o...

A vulnerability, designated CVE-2025-61757, was made public by Searchlight Cyber last Thursday. Company researchers discovered the issue and notified Oracle, which led to its disclosure. Oracle fixed ...

Microsoft has disclosed a critical vulnerability in SharePoint Online (discovered by RHC through our ongoing monitoring of critical CVEs on our portal), identified as CVE‑2025‑59245 , with a CVSS ...

The ransomware landscape is changing. The most exposed actors—LockBit, Hunters International, and Trigona—have paid the price for overexposure, including international operations, infiltrations, d...
The phenomenon of polarization on the internet: Hikikomori
From Likes to Depression: How Social Media Can Affect Our Mental Health
The US and Global Surveillance: Uncovering Section 702 of the Foreign Intelligence Surveillance Act
What is Cross-Site Scripting? An article to help you understand it in a simple way.
Spy Apps: How Spyware Works and Why It’s a Privacy Risk
Asus releases emergency firmware update for vulnerable DSL routers.

The phenomenon of polarization on the internet: Hikikomori
Daniela Farina - November 17th, 2025
Many still maintain that hikikomori is an exclusively Japanese phenomenon. Yet, scientifically, numerous studies now confirm the existence of cases similar in characteristics to Japanese hikikomori in Spain, France, Italy,...

From Likes to Depression: How Social Media Can Affect Our Mental Health
Daniela Farina - November 17th, 2025
Questioning changes as they occur is always a difficult, if not downright foolhardy, undertaking. Certainly, when the object of the investigation concerns the changes social media has wrought on individuals,...

The US and Global Surveillance: Uncovering Section 702 of the Foreign Intelligence Surveillance Act
Aniello Giugliano - November 17th, 2025
Privacy in the United States is a constant topic of debate, especially in the digital age. The Supreme Court has played a central role in interpreting the Fourth Amendment, which...

What is Cross-Site Scripting? An article to help you understand it in a simple way.
Davide Cavallini - November 17th, 2025
Author : Davide Cavallini Today I will try to use the same dialectic ( as previously done in the article on SQL injection ), and explain in a simple way...

Spy Apps: How Spyware Works and Why It’s a Privacy Risk
Redazione RHC - November 17th, 2025
Spyware (also known as spy apps) represent one of the most insidious and dangerous threats of the digital age. These are malicious programs designed to infiltrate a user's device, collecting...

Asus releases emergency firmware update for vulnerable DSL routers.
Redazione RHC - November 17th, 2025
Asus has released an emergency firmware update for several DSL router models. The patch addresses a critical vulnerability that allows attackers to take complete control of devices without authentication. The...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

