Red Hot Cyber. The Cybersecurity Blog
Featured Articles

In recent months, a new cyber operations infrastructure has been developing in the United States, in which automated agents are becoming not just a support tool, but a full-fledged participant in offe...

The scale of the leak, described by a team from the University of Vienna , demonstrates how dangerous the familiar contact search function of popular messaging apps can be. WhatsApp has always emphasi...

November 18, 2025 – After hours of widespread disruptions , the incident affecting Cloudflare’s global network finally appears to be nearing resolution. The company announced it has implemented a ...

Two serious vulnerabilities in IBM’s AIX operating system could allow remote attackers to execute arbitrary commands on affected systems, prompting the company to issue important security updates. B...

The room is the same: dim lights, chairs in a circle, thermoses of herbal teas now cold from all the talking and venting. We are Shakerati Anonimi , a group of people who never imagined we’d end up ...
Kraken Arrives: The New Ransomware That Assesses Your Environment to Inflict Maximum Damage
North Korea reorganizes its intelligence with a new agency
Cognitive Biases and Cybersecurity: The Fatal Fallacy of “I Have Nothing to Hide”
Did they give you a digital photo frame? It’s more than just family memories.
What are PsyOps? Exploring mind manipulation in the digital age.
Understanding Firewalls: The First Line of Defense in Cybersecurity

Kraken Arrives: The New Ransomware That Assesses Your Environment to Inflict Maximum Damage
Redazione RHC - November 15th, 2025
Cisco Talos researchers have detected an active wave of attacks using a new ransomware called Kraken. The group began operating in February 2025 and uses double-extortion methods, without targeting specific...

North Korea reorganizes its intelligence with a new agency
Redazione RHC - November 15th, 2025
North Korea has restructured its intelligence hierarchy, transforming the former Intelligence Agency into a structure with a much broader mandate. The new body, called the General Intelligence Directorate (GIRD), brings...

Cognitive Biases and Cybersecurity: The Fatal Fallacy of “I Have Nothing to Hide”
Fabrizio Saviano - November 15th, 2025
In Italy, over 3,000 people lose their lives on the roads every year, despite everyone knowing basic safety rules. In cybercrime, the scenario isn't all that different: millions of victims...

Did they give you a digital photo frame? It’s more than just family memories.
Redazione RHC - November 15th, 2025
Researchers have discovered several critical vulnerabilities in Uhale digital picture frames running Android , with some models even downloading and executing malware during startup. They examined the Uhale app and...

What are PsyOps? Exploring mind manipulation in the digital age.
Redazione RHC - November 15th, 2025
Psychological operations, commonly known as PsyOps, are a significant and often poorly understood element of military and security strategy . These operations involve the use of psychological tactics to influence...

Understanding Firewalls: The First Line of Defense in Cybersecurity
Redazione RHC - November 15th, 2025
In the world of cybersecurity, firewalls are the first line of defense against cyber threats and attacks. Every day, businesses and home users are exposed to risks such as malware,...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

