Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Crowdstriker 970×120
Precedente Successivo

Latest news

What is Zero Trust Security? A Journey into the Future of Security 2.0 Cyber News

What is Zero Trust Security? A Journey into the Future of Security 2.0

What is Zero Trust? Why is it so important today and why is there so much talk about it? Zero...
Marcello Filacchioni - July 22, 2025
What are Common Vulnerabilities and Exposures (CVE) Cyber News

What are Common Vulnerabilities and Exposures (CVE)

The primary goal of computer security is vulnerability management. In achieving this goal, CVE helps specialists, who are an integral...
Silvia Felici - July 22, 2025
What is Identity and Access Management (IAM)? Let’s find out how to protect your online identities. Cyber News

What is Identity and Access Management (IAM)? Let’s find out how to protect your online identities.

How does a large organization with millions of user credentials circulating between production servers, web applications, mobile apps, and workstations,...
Massimiliano Brolli - July 22, 2025
New wave of Microsoft SharePoint Server attacks claims victims: over 100 organizations affected Cyber News

New wave of Microsoft SharePoint Server attacks claims victims: over 100 organizations affected

We recently discussed a critical zero-day vulnerability, CVE-2025-53770, in Microsoft SharePoint Server, which bypasses the previous security flaw CVE-2025-49706. It...
Redazione RHC - July 22, 2025
TIM’s Red Team Research discovers five CVEs on Eclipse GlassFish, one critical (score 9.8) Cyber News

TIM’s Red Team Research discovers five CVEs on Eclipse GlassFish, one critical (score 9.8)

Thursday, July 16 was a significant day for the cybersecurity researchers of the Italian Red Team Research (RTR) team of...
Silvia Felici - July 21, 2025
What is Secure Code Development? Discovering an essential practice in cybersecurity. Cyber News

What is Secure Code Development? Discovering an essential practice in cybersecurity.

In the previous article on Patch Management, we started talking about 4 fundamental pillars in the world of Cybersecurity. These...
Agostino Pellegrino - July 21, 2025

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE