Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

In Nepal, people are dying for social media! 19 people lost their lives trying to get Facebook back
Di Redazione RHC - 09/09/2025

In a dramatic reversal, Nepal has lifted the nationwide social media blackout imposed last week after it sparked massive youth protests and caused at least 19 deaths, according to local media. The dec...

Xi Jinping and the Chinese APT’s Ambition
Di Alessio Stefan - 08/09/2025

The post-COVID macro political movements, including ongoing conflicts, have prompted a majority of states to shift their medium- to long-term political objectives. Clearly, a paradigm shift has been v...

Salesloft Cyber Attack: Chatbot Drift Temporarily Disabled
Di Redazione RHC - 07/09/2025

Salesloft announced that it would temporarily deactivate its AI-powered chatbot Drift on September 5, after several companies were hit by a massive supply chain attack. The incident resulted in the ma...

Discover the Dark Web: Access, Secrets, and Helpful Links to the Onion Network
Di Redazione RHC - 06/09/2025

The Dark Web is a part of the internet that cannot be reached with standard browsers (Chrome, Firefox, Edge). To access it, you need to use specific tools like the Tor Browser, which guarantees anonym...

AI A2 detected 102 0-day bugs and created exploits in Android apps for $1.77
Di Redazione RHC - 06/09/2025

Artificial intelligence systems have been criticized for creating confusing vulnerability reports and inundating open-source developers with irrelevant complaints. But researchers at Nanjing Universit...

The World of Cybercrime: From Profit-Seeking Criminals to Hacktivists and State-Owned Hackers

The increasingly widespread use of digital technologies has opened up new opportunities for cybercriminals operating online, giving rise to a veritabl...
Redazione RHC - 19/07/2025 - 09:55

What is cyber hacktivism? History, motivations, hacking, consequences, and evolution.

The term "hacktivism" is a combination of the English terms "hacking" and "hacktivism" and was coined to describe the use of computer hacking for poli...
Redazione RHC - 19/07/2025 - 09:51

Disloyal employees. Let’s find out who they are and how to protect ourselves from this growing threat.

In the digital age, cybersecurity is a critical issue for any company handling sensitive data. However, not all risks are external. In fact, employees...
Redazione RHC - 19/07/2025 - 09:48

Bullying and cyberbullying: what it is and how to protect yourself.

News reports are highlighting an ever-increasing number of cases of cyberbullying, some with dramatic outcomes (see incitement to suicide). Cyberbully...
Redazione RHC - 19/07/2025 - 09:47

What is Electronic Warfare (EW). Superiority in the Electromagnetic Spectrum

Electronic Warfare (EW) is one of the most sophisticated and strategically relevant disciplines in modern security. In an age dominated by technology,...
Redazione RHC - 19/07/2025 - 09:45

What is SIM Swapping? Here’s how it works.

These days, smartphones are in practically everyone's pockets. We use them for entertainment, sending messages, storing notes, taking photos, tran...
Redazione RHC - 19/07/2025 - 09:43
1 78 79 80 81 82 137

The World of Cybercrime: From Profit-Seeking Criminals to Hacktivists and State-Owned Hackers

- July 19th, 2025

The increasingly widespread use of digital technologies has opened up new opportunities for cybercriminals operating online, giving rise to a veritable cybercrime ecosystem. In this context, various actors can jeopardize...

  

What is cyber hacktivism? History, motivations, hacking, consequences, and evolution.

- July 19th, 2025

The term "hacktivism" is a combination of the English terms "hacking" and "hacktivism" and was coined to describe the use of computer hacking for political or social purposes. It is...

  

Disloyal employees. Let’s find out who they are and how to protect ourselves from this growing threat.

- July 19th, 2025

In the digital age, cybersecurity is a critical issue for any company handling sensitive data. However, not all risks are external. In fact, employees themselves often pose a threat to...

  

Bullying and cyberbullying: what it is and how to protect yourself.

- July 19th, 2025

News reports are highlighting an ever-increasing number of cases of cyberbullying, some with dramatic outcomes (see incitement to suicide). Cyberbullying is a new form of psychological violence, an invasion and...

  

What is Electronic Warfare (EW). Superiority in the Electromagnetic Spectrum

- July 19th, 2025

Electronic Warfare (EW) is one of the most sophisticated and strategically relevant disciplines in modern security. In an age dominated by technology, where information superiority can decide the outcome of...

  

What is SIM Swapping? Here’s how it works.

- July 19th, 2025

These days, smartphones are in practically everyone's pockets. We use them for entertainment, sending messages, storing notes, taking photos, transferring money, and even "making phone calls," which is what they...

  

Sign up for the newsletter