Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Red Hot Cyber Academy

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

SharePoint and CrowdStrike: Two Faces of the Same Digital Fragility
Di Redazione RHC - 24/07/2025

In recent days, the global digital landscape has been rocked by a cybersecurity bug that affected on-premise Microsoft SharePoint servers, exposing thousands of organizations to cyber attacks. This ev...

ToolShell: Microsoft SharePoint Zero-Day Vulnerability Has Been Under Attack Since Early July
Di Redazione RHC - 24/07/2025

According to cybersecurity experts, several Chinese hacker groups are exploiting a series of zero-day vulnerabilities in Microsoft SharePoint in their attacks. In particular, it emerged that attackers...

Red Hot Cyber Conference 2026. The fifth edition in Rome on Monday, May 18th and Tuesday, May 19th.
Di Redazione RHC - 23/07/2025

The Red Hot Cyber Conference is back! After the great success of the third and fourth editions, the free annual event created by the RHC community is back! An event designed to bring young people clos...

Patriotic Code: From DDoSia and NoName057(16) to CISM, the algorithm that shapes youth for Putin
Di Simone D'Agostino - 23/07/2025

In February 2025 we had already observed the functioning of DDoSIA, the crowd-hacking system promoted by NoName057(16): a client distributed via Telegram, DDoS attacks against European targets, reward...

Artificial Intelligence: History, Technology, Ethics, Regulations, and the Future
Di Redazione RHC - 23/07/2025

Artificial intelligence (AI) is software that can generate output (i.e., content, predictions, decisions, recommendations) capable of interacting with the environment and according to human objectives...

Sophos fixes vulnerabilities in Intercept X for Windows

Sophos announced that it has resolved three separate security vulnerabilities in Sophos Intercept X for Windows and its installer. These vulnerabilities, designated CVE-2024-13972, CVE-2025-7433, and CVE-2025-7472, have been rated High severity. The security bulletin, with Release ID sophos-sa-20250717-cix-lpe, was updated

Google Chrome emergency fix for critical bug that leads to sandbox escape

Google has released an emergency update for the Chrome browser, simultaneously eliminating six vulnerabilities, one of which is already actively exploited in real-world attacks. The issue affects critical components associated with the browser’s graphics engine and can lead to an

Inside Operation Eastwood: The Shadows of Cyberterrorism and Propaganda

The international “Eastwood” operation represents a watershed moment in the fight against cyberterrorism. For the first time, a coordinated global operation has dealt a severe blow to one of the most active cells of pro-Russian hacktivists: the “NoName057(16)” collective. An

What is a False Flag in Cybersecurity: From its Origins to Its Use in Malware and National Security Attacks

- July 20th, 2025

In the vast world of cybersecurity, an often controversial and highly intriguing practice is that of "false flags." This term, originally used in the context of military operations and intelligence,...

  

Chinese humanoid robot replaces its own battery and works 24 hours a day

- July 20th, 2025

The presentation of the Walker S2 represents a major step forward in the operational autonomy of humanoid robots. Thanks to the ability to autonomously replace its own battery, the robot...

  

Gmail introduces Shielded Email. Temporary email to fight spam and protect your privacy.

- July 19th, 2025

Google continues to actively develop Gmail, adding new features with elements of artificial intelligence to the email service. These updates make using email more convenient, but at the same time,...

  

Google files suit against the BadBox2.0 botnet! A thought-provoking lawsuit against unknown individuals

- July 19th, 2025

Google has filed a lawsuit against the anonymous operators of the Android BadBox 2.0 botnet, accusing them of orchestrating a global fraud targeting the company's advertising platforms. BadBox is Android...

  

Sign up for the newsletter