Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
320×100
970x20 Itcentric

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Redazione RHC
(12309 articoli, 10915 italiano, 1394 inglese)12309 articoli
10915 italiano, 1394 inglese

The editorial team of Red Hot Cyber consists of a group of individuals and anonymous sources who actively collaborate to provide early information and news on cybersecurity and computing in general.

Ultimi articoli di Redazione RHC

Cyberattacks skyrocket in Europe! Every three minutes, a company is hit.
With the rapid growth of digital threats, businesses around the world are under cyberattack. According to the latest data from Check Point Research, e...
What are penetration tests, why are they done, who performs them, and the benefits for organizations.
Penetration testing is an increasingly widespread practice in the field of cybersecurity. It is a real simulation of a cyber attack, conducted by a te...
What is Zero Trust Security? A Journey into the Future of Security 2.0
What is Zero Trust? Why is it so important today and why is there so much talk about it? Zero Trust is an innovative approach that is increasingly gai...
What are Common Vulnerabilities and Exposures (CVE)
The primary goal of computer security is vulnerability management. In achieving this goal, CVE helps specialists, who are an integral part of the info...
What is Identity and Access Management (IAM)? Let’s find out how to protect your online identities.
How does a large organization with millions of user credentials circulating between production servers, web applications, mobile apps, and workstation...
New wave of Microsoft SharePoint Server attacks claims victims: over 100 organizations affected
We recently discussed a critical zero-day vulnerability, CVE-2025-53770, in Microsoft SharePoint Server, which bypasses the previous security flaw CVE...
16 flaws discovered in MediaTek chips: smartphones and smart TVs at risk!
In an age where connectivity is ubiquitous and smart devices are an integral part of our daily lives, cybersecurity is no longer optional, but a neces...
Sophos fixes five vulnerabilities in Sophos Firewall, two of which are rated critical
Sophos recently announced the fixes for five independent security vulnerabilities found in its firewalls, some critical and others high and medium. Th...
TIM’s Red Team Research discovers five CVEs on Eclipse GlassFish, one critical (score 9.8)
Thursday, July 16 was a significant day for the cybersecurity researchers of the Italian Red Team Research (RTR) team of TIM, which saw the publicatio...
What is Secure Code Development? Discovering an essential practice in cybersecurity.
In the previous article on Patch Management, we started talking about 4 fundamental pillars in the world of Cybersecurity. These four pillars are Patc...
What is Hardening: Discovering a Preemptive Strategy for Threat Mitigation
We often talk about “hardening” systems, but many people still don’t know exactly what we’re talking about. We’ve almost all discovered the ...
Patch Management: The process to adopt to make your company more secure from cyber attacks
“In the dark forest of the digital world” (as Dante Alighieri would say today), cybersecurity has become a top priority for companies of all sizes...
What are security bugs? A journey through PoCs, exploits, bug bounty programs, and work.
A security bug, also known as a computer security bug, is a type of error or flaw in software that can be exploited by an attacker to compromise the s...
Vulnerability in 7-Zip: Attackers can perform denial-of-service attacks
A critical security flaw related to memory corruption has been discovered in the popular 7-Zip archiver. This vulnerability can be exploited by attack...
ToolShell: The New Threat Affecting Microsoft SharePoint Servers
An advanced cyberattack campaign has been detected targeting Microsoft SharePoint servers. This threat exploits a series of vulnerabilities, known as ...
Uncle Bot, the humanoid robot that’s conquering China and scaring the US
A humanoid robot dressed in casual clothes, resembling an average man, has gained unexpected popularity in China. Nicknamed “Uncle Bot on the intern...
Millions of vehicles at risk of RCE attacks via the PerfektBlue Bluetooth bug
Four vulnerabilities, dubbed PerfektBlue, affect OpenSynergy’s Bluetooth BlueSDK stack. The vulnerabilities allow remote execution of arbitrary code...
Mercedes-Benz and Microsoft are teaming up to integrate Teams and Copilot 365 into cars starting this summer.
On July 16, Mercedes-Benz announced in a press release the expansion of its collaboration with Microsoft, introducing the latest Office solutions and ...
What is ICT Risk Management? A process that supports cybersecurity.
ICT Risk Management is a process that identifies, assesses, and manages risks related to the use of information and communications technologies (ICT)....
How to Start a Cyber Security Program: The First Steps
Cybersecurity has become a crucial component for protecting corporate information and sensitive data. Starting a cybersecurity program is not only a n...