Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Redhotcyber Banner Sito 320x100px Uscita 101125
Banner Ancharia Desktop 1 1

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Redazione RHC
(12314 articoli, 10918 italiano, 1396 inglese)12314 articoli
10918 italiano, 1396 inglese

The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.

Ultimi articoli di Redazione RHC

Cyberattacks skyrocket in Europe! Every three minutes, a company is hit.
With the rapid growth of digital threats, businesses around the world are under cyberattack. According to the latest data from Check Point Research, e...
Discovering IaB JohnDoe7: Access for sale from the common man
We continue our series of articles on Initial Access Brokers with an article on JohnDoe7 (also known as LORD1), who, as we’ll see later, uses a name...
Cyberattacks skyrocket in Europe! Every three minutes, a company is hit.
With the rapid growth of digital threats, businesses around the world are under cyberattack. According to the latest data from Check Point Research, e...
What are penetration tests, why are they done, who performs them, and the benefits for organizations.
Penetration testing is an increasingly widespread practice in the field of cybersecurity. It is a real simulation of a cyber attack, conducted by a te...
What is Zero Trust Security? A Journey into the Future of Security 2.0
What is Zero Trust? Why is it so important today and why is there so much talk about it? Zero Trust is an innovative approach that is increasingly gai...
What are Common Vulnerabilities and Exposures (CVE)
The primary goal of computer security is vulnerability management. In achieving this goal, CVE helps specialists, who are an integral part of the info...
What is Identity and Access Management (IAM)? Let’s find out how to protect your online identities.
How does a large organization with millions of user credentials circulating between production servers, web applications, mobile apps, and workstation...
New wave of Microsoft SharePoint Server attacks claims victims: over 100 organizations affected
We recently discussed a critical zero-day vulnerability, CVE-2025-53770, in Microsoft SharePoint Server, which bypasses the previous security flaw CVE...
16 flaws discovered in MediaTek chips: smartphones and smart TVs at risk!
In an age where connectivity is ubiquitous and smart devices are an integral part of our daily lives, cybersecurity is no longer optional, but a neces...
Sophos fixes five vulnerabilities in Sophos Firewall, two of which are rated critical
Sophos recently announced the fixes for five independent security vulnerabilities found in its firewalls, some critical and others high and medium. Th...
TIM’s Red Team Research discovers five CVEs on Eclipse GlassFish, one critical (score 9.8)
Thursday, July 16 was a significant day for the cybersecurity researchers of the Italian Red Team Research (RTR) team of TIM, which saw the publicatio...
What is Secure Code Development? Discovering an essential practice in cybersecurity.
In the previous article on Patch Management, we started talking about 4 fundamental pillars in the world of Cybersecurity. These four pillars are Patc...
What is Hardening: Discovering a Preemptive Strategy for Threat Mitigation
We often talk about “hardening” systems, but many people still don’t know exactly what we’re talking about. We’ve almost all discovered the ...
Patch Management: The process to adopt to make your company more secure from cyber attacks
“In the dark forest of the digital world” (as Dante Alighieri would say today), cybersecurity has become a top priority for companies of all sizes...
What are security bugs? A journey through PoCs, exploits, bug bounty programs, and work.
A security bug, also known as a computer security bug, is a type of error or flaw in software that can be exploited by an attacker to compromise the s...