Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

TM RedHotCyber 970x120 042543
Precedente Successivo

Latest news

What is tailgating? When penetration tests aren’t enough and the Red Team needs physical security checks. Cyber News

What is tailgating? When penetration tests aren’t enough and the Red Team needs physical security checks.

In red teaming, the term "tailgating" refers to a technique in which a team member attempts to gain unauthorized access...
Redazione RHC - July 29, 2025
Digital Forensics: The Science That Uncovers the Secrets Hidden in Data Cybercrime

Digital Forensics: The Science That Uncovers the Secrets Hidden in Data

Digital Forensics, or computer forensics, is a discipline that deals with the collection, preservation, analysis, and presentation of digital data...
Sandro Sana - July 29, 2025
What are Living off the Land (LotL) attacks? Cyber News

What are Living off the Land (LotL) attacks?

Living off the land means surviving on what you can forage, hunt, or grow, making the most of what nature...
Redazione RHC - July 29, 2025
10 steps to make your company cyber-secure: the RHC guide. Cybercrime

10 steps to make your company cyber-secure: the RHC guide.

In recent weeks, cyber activity on the internet - due to the Russia-Ukraine conflict - has increased significantly. In recent...
Olivia Terragni - July 29, 2025
New macOS bug allows TCC bypass to steal user data Vulnerability

New macOS bug allows TCC bypass to steal user data

Microsoft said that attackers may have exploited a recently patched Transparency, Consent, and Control (TCC) bypass vulnerability to steal sensitive...
Agostino Pellegrino - July 29, 2025
Is Your Smart TV Spying on You? Security Gaps and Critical Vulnerabilities in IoT Devices Vulnerability

Is Your Smart TV Spying on You? Security Gaps and Critical Vulnerabilities in IoT Devices

Networked smart devices are no longer simple helpers, but potential enemies. With every new thermostat or TV connected to the...
Agostino Pellegrino - July 29, 2025

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE