Red Hot Cyber. The Cybersecurity Blog
SharePoint and CrowdStrike: Two Faces of the Same Digital Fragility
In recent days, the global digital landscape has been rocked by a cybersecurity bug that affected on-premise Microsoft SharePoint servers, exposing thousands of organizations to cyber attacks. This ev...
ToolShell: Microsoft SharePoint Zero-Day Vulnerability Has Been Under Attack Since Early July
According to cybersecurity experts, several Chinese hacker groups are exploiting a series of zero-day vulnerabilities in Microsoft SharePoint in their attacks. In particular, it emerged that attackers...
Red Hot Cyber Conference 2026. The fifth edition in Rome on Monday, May 18th and Tuesday, May 19th.
The Red Hot Cyber Conference is back! After the great success of the third and fourth editions, the free annual event created by the RHC community is back! An event designed to bring young people clos...
Patriotic Code: From DDoSia and NoName057(16) to CISM, the algorithm that shapes youth for Putin
In February 2025 we had already observed the functioning of DDoSIA, the crowd-hacking system promoted by NoName057(16): a client distributed via Telegram, DDoS attacks against European targets, reward...
Artificial Intelligence: History, Technology, Ethics, Regulations, and the Future
Artificial intelligence (AI) is software that can generate output (i.e., content, predictions, decisions, recommendations) capable of interacting with the environment and according to human objectives...
What are penetration tests, why are they done, who performs them, and the benefits for organizations.
Penetration testing is an increasingly widespread practice in the field of cybersecurity. It is a real simulation of a cyber attack, conducted by a team of security experts, in order to identify and a...
What is Identity and Access Management (IAM)? Let’s find out how to protect your online identities.
How does a large organization with millions of user credentials circulating between production servers, web applications, mobile apps, and workstations, connecting to countless profiles, keep proper r...
Sophos fixes five vulnerabilities in Sophos Firewall, two of which are rated critical
Sophos recently announced the fixes for five independent security vulnerabilities found in its firewalls, some critical and others high and medium. The vulnerabilities have been fixed via automaticall...
What is Secure Code Development? Discovering an essential practice in cybersecurity.
In the previous article on Patch Management, we started talking about 4 fundamental pillars in the world of Cybersecurity. These four pillars are Patch Management, Hardening, Secure Code Development, ...
Vulnerability in 7-Zip: Attackers can perform denial-of-service attacks
A critical security flaw related to memory corruption has been discovered in the popular 7-Zip archiver. This vulnerability can be exploited by attackers to cause denial-of-service conditions by creat...
Featured Articles

In recent days, the global digital landscape has been rocked by a cybersecurity bug that affected on-premise Microsoft SharePoint servers, exposing thousands of organizations to cyber attacks. This ev...

According to cybersecurity experts, several Chinese hacker groups are exploiting a series of zero-day vulnerabilities in Microsoft SharePoint in their attacks. In particular, it emerged that attackers...

The Red Hot Cyber Conference is back! After the great success of the third and fourth editions, the free annual event created by the RHC community is back! An event designed to bring young people clos...

In February 2025 we had already observed the functioning of DDoSIA, the crowd-hacking system promoted by NoName057(16): a client distributed via Telegram, DDoS attacks against European targets, reward...

Artificial intelligence (AI) is software that can generate output (i.e., content, predictions, decisions, recommendations) capable of interacting with the environment and according to human objectives...

Patriotic Code: From DDoSia and NoName057(16) to CISM, the algorithm that shapes youth for Putin
In February 2025 we had already observed the functioning of DDoSIA, the crowd-hacking system promoted by NoName057(16): a client distributed via Telegram, DDoS attacks against European targets, rewards in cryptocurrencies.A simple, brutal, but effective machine. Its strong point is not

Critical Vulnerabilities in Cisco ISE: Urgent Updates Needed
The recently discovered critical vulnerabilities in Cisco infrastructure are already being actively exploited by attackers to attack corporate networks. The company has officially confirmed that its Public Security Incident Response Team (PSIRT) has recorded attempts to exploit these vulnerabilities in

The AI Revolution and How It Will Change the World
In the contemporary technological landscape, one transformative force clearly emerges: Artificial Intelligence (AI). AI is revolutionizing our world in ways we would have struggled to imagine just a few decades ago. This article explores the profound implications of AI’s rise

History of Artificial Intelligence. From the 1950s to the present day.
Artificial intelligence (AI) is a discipline that aims to develop systems capable of emulating some of human cognitive abilities. Over the years, AI has gone through different phases, with periods of fervent activity followed by periods of slowdown. In this

Artificial Intelligence: History, Technology, Ethics, Regulations, and the Future
Artificial intelligence (AI) is software that can generate output (i.e., content, predictions, decisions, recommendations) capable of interacting with the environment and according to human objectives. The spread of this technology is constituting a specific field of study and research that

Cyberattacks skyrocket in Europe! Every three minutes, a company is hit.
With the rapid growth of digital threats, businesses around the world are under cyberattack. According to the latest data from Check Point Research, each organization experiences an average of 1,984 attempted attacks per week, a 143% increase from four years

ToolShell: Microsoft SharePoint Zero-Day Vulnerability Has Been Under Attack Since Early July
Redazione RHC - July 24th, 2025
According to cybersecurity experts, several Chinese hacker groups are exploiting a series of zero-day vulnerabilities in Microsoft SharePoint in their attacks. In particular, it emerged that attackers also compromised the...

Red Hot Cyber Conference 2026. The fifth edition in Rome on Monday, May 18th and Tuesday, May 19th.
Redazione RHC - July 23rd, 2025
The Red Hot Cyber Conference is back! After the great success of the third and fourth editions, the free annual event created by the RHC community is back! An event...

Patriotic Code: From DDoSia and NoName057(16) to CISM, the algorithm that shapes youth for Putin
Simone D'Agostino - July 23rd, 2025
In February 2025 we had already observed the functioning of DDoSIA, the crowd-hacking system promoted by NoName057(16): a client distributed via Telegram, DDoS attacks against European targets, rewards in cryptocurrencies.A...

Critical Vulnerabilities in Cisco ISE: Urgent Updates Needed
Redazione RHC - July 23rd, 2025
The recently discovered critical vulnerabilities in Cisco infrastructure are already being actively exploited by attackers to attack corporate networks. The company has officially confirmed that its Public Security Incident Response...
Sign up for the newsletter