Welcome to Red Hot Cyber | Cybersecurity News
Red Hot Cyber
Cybersecurity is about sharing.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Banner Ancharia Mobile 1
Banner Ancharia Desktop 1 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Using a VPN to watch adult content? It’ll be a crime in Wisconsin.

Wisconsin authorities have decided to go further than most other US states in promoting mandatory age verification for accessing adult...
Redazione RHC - 18 October 2025

Introduction to Convolutional Neural Networks

In the ever-expanding world of artificial intelligence (AI), there is a revolutionary technology that has changed the way machines “see”...
Simone Raponi - 18 October 2025

Pasquale’s Experience: A Text Message in the Heat – Session 1

Cybercrime is increasingly looming over the unfortunate online world. Fake profiles and scams are rampant on social networks, which, even...
Massimiliano Brolli - 18 October 2025

Inside IEEE 802.11 Wireless Networks: Wi-Fi Architecture and Signaling

IEEE 802.11 wireless networks, better known as Wi-Fi, are the beating heart of modern connectivity. From a niche solution for...
Vincenzo Miccoli - 18 October 2025

WiFi: From Marconi’s Origins to the Wireless Network We Know Today

Today, we live in a world where WiFi is a fundamental necessity, but how did this technology, now taken for...
RedWave Team - 18 October 2025

Operation SIMCARTEL: 1,200 SIM boxes and 40,000 SIM cards stopped by Europol

On October 10, 2025, Latvian authorities conducted a day of action that resulted in the arrest of five Latvian citizens...
Redazione RHC - 18 October 2025

Using a VPN to watch adult content? It’ll be a crime in Wisconsin.

Wisconsin authorities have decided to go further than most other US states in promoting mandatory age verification for accessing adult content. AB 105 / SB 130 , first introduced in...
Facebook Linkedin X

Introduction to Convolutional Neural Networks

In the ever-expanding world of artificial intelligence (AI), there is a revolutionary technology that has changed the way machines “see” and “understand” the world around them: Convolutional Neural Networks (CNNs)....
Facebook Linkedin X

Pasquale’s Experience: A Text Message in the Heat – Session 1

Cybercrime is increasingly looming over the unfortunate online world. Fake profiles and scams are rampant on social networks, which, even with the best artificial intelligence, struggle to keep up with...
Facebook Linkedin X

Inside IEEE 802.11 Wireless Networks: Wi-Fi Architecture and Signaling

IEEE 802.11 wireless networks, better known as Wi-Fi, are the beating heart of modern connectivity. From a niche solution for home use to a technological cornerstone for the Internet of...
Facebook Linkedin X

WiFi: From Marconi’s Origins to the Wireless Network We Know Today

Today, we live in a world where WiFi is a fundamental necessity, but how did this technology, now taken for granted, come about? How did it then develop into the...
Facebook Linkedin X

Operation SIMCARTEL: 1,200 SIM boxes and 40,000 SIM cards stopped by Europol

On October 10, 2025, Latvian authorities conducted a day of action that resulted in the arrest of five Latvian citizens suspected of running a large-scale cyber fraud network. The operation,...
Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sito
TikTok Accused of Illegally Tracking Users’ Data Across Apps
Redazione RHC - 21/12/2025

The popular video app TikTok has found itself at the center of a new scandal over violations of European data protection regulations. The service has been found to track users’ activity not only within its…

Immagine del sito
Naftali Bennett Telegram Account Hacked in Israel Politics
Redazione RHC - 21/12/2025

Former Israeli Prime Minister Naftali Bennett has admitted that his Telegram account was hacked, although his device was not compromised. He made the announcement following reports of a hacked iPhone and a data leak allegedly…

Immagine del sito
Cisco Secure Email Gateway Vulnerability Exploited: Act Now
Redazione RHC - 21/12/2025

A critical zero-day flaw in Cisco Secure Email Gateway and Cisco Secure Email and Web Manager devices is causing concern among security researchers. With over 120 vulnerable devices already identified and actively exploited by attackers,…

Immagine del sito
Airbus Eyes Sovereign Cloud to Mitigate US Data Risks
Redazione RHC - 21/12/2025

In recent months, a question has been emerging with increasing insistence on European corporate boards: is the US cloud really safe for all companies? Especially for those operating in strategic sectors or with economic, industrial,…

Immagine del sito
North Korean Hackers Steal $2 Billion in Crypto, Targeting DeFi Sector
Redazione RHC - 21/12/2025

In 2025, North Korean hackers stole a record $2 billion in cryptocurrency , 51% more than the previous year. However, the number of attacks has decreased, while the damage has increased. According to Chainalysis, North…