Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
2nd Edition GlitchZone RHC 320x100 2
Enterprise BusinessLog 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Multi-threaded Hacking: US Pioneers Automated Operations with AI Agents
Di Redazione RHC - 19/11/2025

In recent months, a new cyber operations infrastructure has been developing in the United States, in which automated agents are becoming not just a support tool, but a full-fledged participant in offe...

Immagine del sito
WhatsApp data leak: 3.5 billion numbers “stolen” by researchers at the University of Vienna
Di Redazione RHC - 19/11/2025

The scale of the leak, described by a team from the University of Vienna , demonstrates how dangerous the familiar contact search function of popular messaging apps can be. WhatsApp has always emphasi...

Immagine del sito
Cloudflare goes down in the magnificent cloud! Global incident is being resolved.
Di Redazione RHC - 18/11/2025

November 18, 2025 – After hours of widespread disruptions , the incident affecting Cloudflare’s global network finally appears to be nearing resolution. The company announced it has implemented a ...

Immagine del sito
IBM AIX: Two critical bugs allow execution of arbitrary commands (Score 10 and 9.6)
Di Redazione RHC - 18/11/2025

Two serious vulnerabilities in IBM’s AIX operating system could allow remote attackers to execute arbitrary commands on affected systems, prompting the company to issue important security updates. B...

Immagine del sito
Shakerati Anonimi: Nicoletta’s experience and the credit card thriller
Di Redazione RHC - 18/11/2025

The room is the same: dim lights, chairs in a circle, thermoses of herbal teas now cold from all the talking and venting. We are Shakerati Anonimi , a group of people who never imagined we’d end up ...

Kraken Arrives: The New Ransomware That Assesses Your Environment to Inflict Maximum Damage

Cisco Talos researchers have detected an active wave of attacks using a new ransomware called Kraken. The group began operating in February 2025 and u...
Redazione RHC - 15/11/2025 - 13:05

North Korea reorganizes its intelligence with a new agency

North Korea has restructured its intelligence hierarchy, transforming the former Intelligence Agency into a structure with a much broader mandate. The...
Redazione RHC - 15/11/2025 - 12:41

Cognitive Biases and Cybersecurity: The Fatal Fallacy of “I Have Nothing to Hide”

In Italy, over 3,000 people lose their lives on the roads every year, despite everyone knowing basic safety rules. In cybercrime, the scenario isn't a...
Fabrizio Saviano - 15/11/2025 - 12:39

Did they give you a digital photo frame? It’s more than just family memories.

Researchers have discovered several critical vulnerabilities in Uhale digital picture frames running Android , with some models even downloading and e...
Redazione RHC - 15/11/2025 - 12:38

What are PsyOps? Exploring mind manipulation in the digital age.

Psychological operations, commonly known as PsyOps, are a significant and often poorly understood element of military and security strategy . These op...
Redazione RHC - 15/11/2025 - 11:10

Understanding Firewalls: The First Line of Defense in Cybersecurity

In the world of cybersecurity, firewalls are the first line of defense against cyber threats and attacks. Every day, businesses and home users are exp...
Redazione RHC - 15/11/2025 - 11:03
1 6 7 8 9 10 247

Kraken Arrives: The New Ransomware That Assesses Your Environment to Inflict Maximum Damage

- November 15th, 2025

Cisco Talos researchers have detected an active wave of attacks using a new ransomware called Kraken. The group began operating in February 2025 and uses double-extortion methods, without targeting specific...

Facebook Linkedin X

North Korea reorganizes its intelligence with a new agency

- November 15th, 2025

North Korea has restructured its intelligence hierarchy, transforming the former Intelligence Agency into a structure with a much broader mandate. The new body, called the General Intelligence Directorate (GIRD), brings...

Facebook Linkedin X

Cognitive Biases and Cybersecurity: The Fatal Fallacy of “I Have Nothing to Hide”

- November 15th, 2025

In Italy, over 3,000 people lose their lives on the roads every year, despite everyone knowing basic safety rules. In cybercrime, the scenario isn't all that different: millions of victims...

Facebook Linkedin X

Did they give you a digital photo frame? It’s more than just family memories.

- November 15th, 2025

Researchers have discovered several critical vulnerabilities in Uhale digital picture frames running Android , with some models even downloading and executing malware during startup. They examined the Uhale app and...

Facebook Linkedin X

What are PsyOps? Exploring mind manipulation in the digital age.

- November 15th, 2025

Psychological operations, commonly known as PsyOps, are a significant and often poorly understood element of military and security strategy . These operations involve the use of psychological tactics to influence...

Facebook Linkedin X

Understanding Firewalls: The First Line of Defense in Cybersecurity

- November 15th, 2025

In the world of cybersecurity, firewalls are the first line of defense against cyber threats and attacks. Every day, businesses and home users are exposed to risks such as malware,...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE