Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The Russian Federation’s Roskomnadzor has announced that it continues to impose systematic restrictions on the messaging app WhatsApp due to violations of Russian law. According to the agency, the s...

The Shai-Hulud worm has spread beyond the npm ecosystem and was discovered in Maven . Socket specialists noticed an infected package on Maven Central containing the same malicious components used in t...

Artificial intelligence is currently capable of performing work equivalent to 11.7% of US employment . And not just in theory: in terms of monetary value, this value is already comparable to the salar...

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...
TIM’s Red Team Research discovers five CVEs on Eclipse GlassFish, one critical (score 9.8)
What is Secure Code Development? Discovering an essential practice in cybersecurity.
What is Hardening: Discovering a Preemptive Strategy for Threat Mitigation
Patch Management: The process to adopt to make your company more secure from cyber attacks
What are security bugs? A journey through PoCs, exploits, bug bounty programs, and work.
Vulnerability in 7-Zip: Attackers can perform denial-of-service attacks

TIM’s Red Team Research discovers five CVEs on Eclipse GlassFish, one critical (score 9.8)
Redazione RHC - July 20th, 2025
Thursday, July 16 was a significant day for the cybersecurity researchers of the Italian Red Team Research (RTR) team of TIM, which saw the publication of five new vulnerabilities (CVE)...

What is Secure Code Development? Discovering an essential practice in cybersecurity.
Redazione RHC - July 20th, 2025
In the previous article on Patch Management, we started talking about 4 fundamental pillars in the world of Cybersecurity. These four pillars are Patch Management, Hardening, Secure Code Development, and...

What is Hardening: Discovering a Preemptive Strategy for Threat Mitigation
Redazione RHC - July 20th, 2025
We often talk about "hardening" systems, but many people still don't know exactly what we're talking about. We've almost all discovered the pillars of cybersecurity, and among them are the...

Patch Management: The process to adopt to make your company more secure from cyber attacks
Redazione RHC - July 20th, 2025
"In the dark forest of the digital world" (as Dante Alighieri would say today), cybersecurity has become a top priority for companies of all sizes. Constant cyber attacks make headlines...

What are security bugs? A journey through PoCs, exploits, bug bounty programs, and work.
Redazione RHC - July 20th, 2025
A security bug, also known as a computer security bug, is a type of error or flaw in software that can be exploited by an attacker to compromise the security...

Vulnerability in 7-Zip: Attackers can perform denial-of-service attacks
Redazione RHC - July 20th, 2025
A critical security flaw related to memory corruption has been discovered in the popular 7-Zip archiver. This vulnerability can be exploited by attackers to cause denial-of-service conditions by creating malicious...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

