Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The world of technology is a veritable battlefield, where coding geniuses challenge malicious attackers every day with exploits and security patches. That’s why the recent discovery of a vulnerabili...

Cybersecurity is a serious issue, especially when it comes to vulnerabilities that can compromise an entire system. Well, Hewlett Packard Enterprise (HPE) has just raised the alarm about a truly worry...

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical alert including three new vulnerabilities in its catalog of exploited cyber threats (KEVs), highlighting that these fl...

The psychology of passwords starts right here: trying to understand people before systems. Welcome to “The Mind Behind Passwords,” the column that looks at cybersecurity. From a different perspect...

New details emerge from an Amazon Threat Intelligence report that highlight an alarming shift in Russian government-backed cyber operations. High-level 0-day exploits, often attributed to state-sponso...
Le Security Operations al tempo dell’Artificial Intelligence
The race for cybersecurity has begun and Italy is running with its shoes tied
Taiwan launches international initiative for submarine cable safety
Port scanning in 2025: Nmap and AI — how to integrate them securely and operationally
The Louvre Theft: When Thieves Taught the World the Physical Pen Test
Starting November 12th, age verification for porn sites will be implemented in Italy. What’s changing?

Le Security Operations al tempo dell’Artificial Intelligence
Redazione RHC - October 31st, 2025
By Vicki Vinci, SOC Architect - International at Fortinet The most significant technological trend of recent years is undoubtedly the advent of Artificial Intelligence, especially its generative component (GenAI). Putting...

The race for cybersecurity has begun and Italy is running with its shoes tied
Fabrizio Saviano - October 31st, 2025
In recent years, cybersecurity has risen to the top of the agendas of businesses, institutions, and public administration. But if we look at the numbers, Italy still seems to be...

Taiwan launches international initiative for submarine cable safety
Redazione RHC - October 31st, 2025
On October 28, 2025, during the Taiwan-EU Submarine Cable Safety Cooperation Forum held in Taipei, Taiwanese Foreign Minister Lin Chia-lung introduced the "International Initiative for Submarine Cable Risk Management" ,...

Port scanning in 2025: Nmap and AI — how to integrate them securely and operationally
Luca Stivali - October 31st, 2025
In 2025, port scanning remains a key activity for both Red Teams (reconnaissance, discovery, fingerprinting) and Blue Teams (monitoring and proactive defense). But the latest development is the arrival of...

The Louvre Theft: When Thieves Taught the World the Physical Pen Test
Luca Errico - October 31st, 2025
The event that shook the world on October 19, 2025, was not a natural disaster or a financial collapse, but the sensational theft of Napoleon's jewels from the Louvre Museum....

Starting November 12th, age verification for porn sites will be implemented in Italy. What’s changing?
Redazione RHC - October 30th, 2025
Starting Tuesday, November 12, 2025, new provisions from the Italian Communications Regulatory Authority (AGCOM) will come into force, requiring an age verification system for accessing pornographic websites. The measure, provided...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

