Red Hot Cyber. The Cybersecurity Blog
Featured Articles

Security researchers have discovered a sophisticated exploit campaign that leverages a private out-of-band application security testing (OAST) service hosted on Google Cloud infrastructure. The campai...

The underground cybercrime market continues to evolve rapidly, fueled by specialized groups designing and selling tools for increasingly sophisticated digital scams. Among these, a particularly active...

American aviation and defense components manufacturer ADC Aerospace has found itself in the spotlight due to a possible cyber attack by the Play ransomware group, which appeared on their blog where cr...

This article analyzes the disclosure submitted to Microsoft and available in English on digitaldefense , where images, demonstration videos and a Python code example are available. In recent years, di...

Airbus has announced the recall of approximately 6,500 A320 aircraft due to potential failures in the ELAC control system caused by powerful solar flares. The recall followed a sudden loss of altitude...
The Future of Tech: How to Navigate the Digital World
Google Gemini 3.0 Shakes Nvidia’s AI Dominance with TPU Innovation
CISA Warns of Spyware Attacks on Mobile Messaging Apps
New ClickFix Malware Campaign Targets Windows Users with Fake Updates
GDPR Data Breach: Email Errors and Consequences
Ettore Accenti: The Italian Tech Pioneer Who Brought Intel to Italy

The Future of Tech: How to Navigate the Digital World
Redazione RHC - November 25th, 2025
There are books that explain technology and books that make you understand why you should pause for a minute before scrolling through a feed. Il Futuro Prossimo , Sandro Sana...

Google Gemini 3.0 Shakes Nvidia’s AI Dominance with TPU Innovation
Redazione RHC - November 24th, 2025
Nvidia's dominance in the artificial intelligence (AI) sector was shaken by the acclaim for Google's "Gemini 3.0." Nvidia's stock price fell more than 2% in after-hours trading. SK Hynix, a...

CISA Warns of Spyware Attacks on Mobile Messaging Apps
Redazione RHC - November 24th, 2025
An important advisory was published on Monday by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) , warning that malicious actors are actively using commercial spyware tools and remote access...

New ClickFix Malware Campaign Targets Windows Users with Fake Updates
Redazione RHC - November 24th, 2025
Fake Windows updates have entered a new round of ClickFix campaigns, as reported by Huntress. Attackers are increasingly replacing bot controls with full-screen blue windows that simulate a system update....

GDPR Data Breach: Email Errors and Consequences
Stefano Gazzella - November 24th, 2025
Like it or not, sending an email to the wrong recipient constitutes a personal data breach under the GDPR. This obviously applies if the email contains personal data or if...

Ettore Accenti: The Italian Tech Pioneer Who Brought Intel to Italy
Carlo Denza - November 24th, 2025
With exclusive photographs and unpublished documents: the extraordinary story of the Italian engineer who collaborated with Gordon Moore and Alan Sugar, bringing Intel to Italy and building the first tech...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

