Red Hot Cyber. The Cybersecurity Blog
Featured Articles

Of all the vulnerabilities, the most feared by victims and the most sought after by attackers is remote code execution, or RCE. This vulnerability allows arbitrary commands to be executed on the attac...

Global traffic, as RHC readers know, travels mostly under the sea. According to TeleGeography, a telecommunications institute, there are more than 530 active submarine optical cable systems worldwide,...

It was time for Italy to wait for a clear signal in the area of digital sovereignty. The union of two giants like TIM and Poste Italiane represents more than a simple commercial partnership, but a tru...

An analysis conducted in recent months had highlighted how the evolution of artificial intelligence systems was reaching a critical point for cybersecurity, with capabilities doubling in just six mont...

Attackers are actively exploiting a critical flaw in Fortinet’s FortiWeb web application protection (WAF) system, which could be used as a means to conduct zero-day attacks without prior detection. ...
Let’s find out what cyber insurance is. It insures your online business, but not only that.
Let’s find out what Business Impact Analysis (BIA) is
What is risk analysis in ICT Risk Management?
What is Web Scraping? Let’s Understand It Better
What is a zero-day and the risk of targeted cyber attacks
The world of software vulnerabilities: how they’re exploited, who creates them, and how to protect yourself.

Let’s find out what cyber insurance is. It insures your online business, but not only that.
Redazione RHC - November 11th, 2025
The digital world is constantly evolving, and with the growth of online activity, protecting your business from potential cyber threats has become increasingly important. Cyber insurance is a form of...

Let’s find out what Business Impact Analysis (BIA) is
Redazione RHC - November 11th, 2025
Business Impact Analysis (BIA) is a fundamental tool for ensuring business continuity. BIA helps organizations identify activities critical to their operations, the risks associated with those activities, and the impacts...

What is risk analysis in ICT Risk Management?
Redazione RHC - November 11th, 2025
Risk analysis is an important process in the context of ICT Risk Management as it allows us to evaluate the effectiveness of the technical countermeasures adopted to mitigate ICT risks....

What is Web Scraping? Let’s Understand It Better
Redazione RHC - November 11th, 2025
We have often talked about huge user databases being sold on underground forums and said that this was web scraping. In April 2021, Facebook lost 533 million users , while...

What is a zero-day and the risk of targeted cyber attacks
Redazione RHC - November 11th, 2025
Zero-day vulnerabilities are one of the greatest cybersecurity risks for organizations. These are unknown and unpatched vulnerabilities that attackers exploit to penetrate IT systems and compromise data security. In this...

The world of software vulnerabilities: how they’re exploited, who creates them, and how to protect yourself.
Redazione RHC - November 11th, 2025
Software vulnerabilities pose a threat to cybersecurity because hackers can exploit them to gain access to computer systems. A software vulnerability is a flaw in software that can be used...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

