Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Banner Mobile
Crowdstriker 970×120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Happy birthday, Windows! 40 years of operating system history and still going strong.
Di Redazione RHC - 20/11/2025

Exactly 40 years ago, on November 20, 1985, Microsoft released Windows 1.0 , the first version of Windows, which attempted to transform the then-personal computer from a machine with a monotonous comm...

Immagine del sito
Multi-threaded Hacking: US Pioneers Automated Operations with AI Agents
Di Redazione RHC - 19/11/2025

In recent months, a new cyber operations infrastructure has been developing in the United States, in which automated agents are becoming not just a support tool, but a full-fledged participant in offe...

Immagine del sito
WhatsApp data leak: 3.5 billion numbers “stolen” by researchers at the University of Vienna
Di Redazione RHC - 19/11/2025

The scale of the leak, described by a team from the University of Vienna , demonstrates how dangerous the familiar contact search function of popular messaging apps can be. WhatsApp has always emphasi...

Immagine del sito
Cloudflare goes down in the magnificent cloud! Global incident is being resolved.
Di Redazione RHC - 18/11/2025

November 18, 2025 – After hours of widespread disruptions , the incident affecting Cloudflare’s global network finally appears to be nearing resolution. The company announced it has implemented a ...

Immagine del sito
IBM AIX: Two critical bugs allow execution of arbitrary commands (Score 10 and 9.6)
Di Redazione RHC - 18/11/2025

Two serious vulnerabilities in IBM’s AIX operating system could allow remote attackers to execute arbitrary commands on affected systems, prompting the company to issue important security updates. B...

The stress of social network algorithms causes burnout in creators

A new research project has shown that the online content industry, which has offered people thousands of new ways to earn money, is also placing signi...
Redazione RHC - 16/11/2025 - 08:53

Discovering Tor Browser: The Digital Fortress for Online Privacy

Tor Browser (short for The Onion Router) is a free, open-source web browser designed specifically to protect users' online privacy. Using a network of...
Raffaela Crisci - 15/11/2025 - 16:12

Virtual Private Network (VPN): What It Is, How It Works, and Why

A VPN , short for Virtual Private Network, is a system that allows you to establish a secure and private connection over a public network, such as the...
Redazione RHC - 15/11/2025 - 16:10

Rare Earths: What They Are and Why They Matter More Than Oil in Today’s World

We often hear about the so-called "Rare Earths". This is a set of seventeen metallic elements. These include the fifteen lanthanides on the periodic t...
Redazione RHC - 15/11/2025 - 16:08

Let’s discover injections explained in a simple way

Good morning everyone. I'm Davide Cavallini, a web developer and penetration tester. Today I'm going to talk about injections. There are various types...
Davide Cavallini - 15/11/2025 - 15:55

A journey into the world of OT/ICS: What are SCADA servers?

The world of OT (Operational Technology) and ICS (Industrial Control Systems) is closely related to SCADA (Supervisory Control and Data Acquisition) s...
Redazione RHC - 15/11/2025 - 15:48
1 5 6 7 8 9 248

The stress of social network algorithms causes burnout in creators

- November 16th, 2025

A new research project has shown that the online content industry, which has offered people thousands of new ways to earn money, is also placing significant mental stress on its...

Facebook Linkedin X

Discovering Tor Browser: The Digital Fortress for Online Privacy

- November 15th, 2025

Tor Browser (short for The Onion Router) is a free, open-source web browser designed specifically to protect users' online privacy. Using a network of servers distributed around the world, Tor...

Facebook Linkedin X

Virtual Private Network (VPN): What It Is, How It Works, and Why

- November 15th, 2025

A VPN , short for Virtual Private Network, is a system that allows you to establish a secure and private connection over a public network, such as the Internet ....

Facebook Linkedin X

Rare Earths: What They Are and Why They Matter More Than Oil in Today’s World

- November 15th, 2025

We often hear about the so-called "Rare Earths". This is a set of seventeen metallic elements. These include the fifteen lanthanides on the periodic table , plus scandium and yttrium...

Facebook Linkedin X

Let’s discover injections explained in a simple way

- November 15th, 2025

Good morning everyone. I'm Davide Cavallini, a web developer and penetration tester. Today I'm going to talk about injections. There are various types, but what does it conceptually mean to...

Facebook Linkedin X

A journey into the world of OT/ICS: What are SCADA servers?

- November 15th, 2025

The world of OT (Operational Technology) and ICS (Industrial Control Systems) is closely related to SCADA (Supervisory Control and Data Acquisition) systems. In industrial automation, SCADA systems play a fundamental...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE