Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

What is cyber hacktivism? History, motivations, hacking, consequences, and evolution.
Di Redazione RHC - 19/07/2025

The term “hacktivism” is a combination of the English terms “hacking” and “hacktivism” and was coined to describe the use of computer hacking for political or socia...

Disloyal employees. Let’s find out who they are and how to protect ourselves from this growing threat.
Di Redazione RHC - 19/07/2025

In the digital age, cybersecurity is a critical issue for any company handling sensitive data. However, not all risks are external. In fact, employees themselves often pose a threat to an organization...

Bullying and cyberbullying: what it is and how to protect yourself.
Di Redazione RHC - 19/07/2025

News reports are highlighting an ever-increasing number of cases of cyberbullying, some with dramatic outcomes (see incitement to suicide). Cyberbullying is a new form of psychological violence, an in...

What are Botnets? A Journey Through Malware, Cyber Threat Intelligence, and OSINT
Di Redazione RHC - 16/07/2025

The Internet provides a sea of information. We often talk on RHC about Open Source Intelligence (OSINT) and Cyber Threat Intelligence (CTI), i.e. those intelligence disciplines that deal with the rese...

What is a zero-day and the risk of targeted cyber attacks
Di Redazione RHC - 16/07/2025

Zero-day vulnerabilities are one of the greatest cybersecurity risks for organizations. These are unknown and unpatched vulnerabilities that attackers exploit to penetrate computer systems and comprom...

Magnus Carlsen beats ChatGPT at chess without losing a piece!

Magnus Carlsen beat ChatGPT at chess without losing a single piece, while his virtual opponent lost all his pawns. The Norwegian grandmaster posted screenshots of the game on the social network X on July 10. The artificial intelligence admitted defeat

Putin imposes restrictions on foreign software that has “strangled” Russia

The Kremlin press office reported that Russian President Vladimir Putin has instructed the government to develop additional restrictions on software (including “communications services”)produced in hostile countries by September 1, 2025. The list of instructions was drawn up following a meeting

Sophos fixes vulnerabilities in Intercept X for Windows

Sophos announced that it has resolved three separate security vulnerabilities in Sophos Intercept X for Windows and its installer. These vulnerabilities, designated CVE-2024-13972, CVE-2025-7433, and CVE-2025-7472, have been rated High severity. The security bulletin, with Release ID sophos-sa-20250717-cix-lpe, was updated

What is SIM Swapping? Here’s how it works.

- July 19th, 2025

These days, smartphones are in practically everyone's pockets. We use them for entertainment, sending messages, storing notes, taking photos, transferring money, and even "making phone calls," which is what they...

  

What are zero-day brokers? Discovering the underground market of security vulnerabilities

- July 19th, 2025

Zeroday brokers are intermediaries who buy and sell software vulnerabilities that are unknown to the manufacturers and organizations that use them. These vulnerabilities, known as "zerodays," are exploited by cybercriminals...

  

Apache Tomcat DoS Vulnerability: CVE-2025-53506 Under Analysis

- July 19th, 2025

The Apache team recently fixed a denial-of-service (DoS) vulnerability classified as high severity. There's a new inconvenient guest in data centers around the world. It's called CVE-2025-53506 and it doesn't...

  

Magnus Carlsen beats ChatGPT at chess without losing a piece!

- July 18th, 2025

Magnus Carlsen beat ChatGPT at chess without losing a single piece, while his virtual opponent lost all his pawns. The Norwegian grandmaster posted screenshots of the game on the social...

  

Sign up for the newsletter