Red Hot Cyber. The Cybersecurity Blog
What are penetration tests, why are they done, who performs them, and the benefits for organizations.
Penetration testing is an increasingly widespread practice in the field of cybersecurity. It is a real simulation of a cyber attack, conducted by a team of security experts, in order to identify and a...
What is Identity and Access Management (IAM)? Let’s find out how to protect your online identities.
How does a large organization with millions of user credentials circulating between production servers, web applications, mobile apps, and workstations, connecting to countless profiles, keep proper r...
Sophos fixes five vulnerabilities in Sophos Firewall, two of which are rated critical
Sophos recently announced the fixes for five independent security vulnerabilities found in its firewalls, some critical and others high and medium. The vulnerabilities have been fixed via automaticall...
What is Secure Code Development? Discovering an essential practice in cybersecurity.
In the previous article on Patch Management, we started talking about 4 fundamental pillars in the world of Cybersecurity. These four pillars are Patch Management, Hardening, Secure Code Development, ...
Vulnerability in 7-Zip: Attackers can perform denial-of-service attacks
A critical security flaw related to memory corruption has been discovered in the popular 7-Zip archiver. This vulnerability can be exploited by attackers to cause denial-of-service conditions by creat...
What are Side Channel Attacks? How they work and how to defend data from cyber threat physics.
Side Channel Attacks represent a sophisticated category of cyber threats that focus on weaknesses in security systems. These attacks differ from traditional techniques based on brute force or software...
What is cyber hacktivism? History, motivations, hacking, consequences, and evolution.
The term “hacktivism” is a combination of the English terms “hacking” and “hacktivism” and was coined to describe the use of computer hacking for political or socia...
Disloyal employees. Let’s find out who they are and how to protect ourselves from this growing threat.
In the digital age, cybersecurity is a critical issue for any company handling sensitive data. However, not all risks are external. In fact, employees themselves often pose a threat to an organization...
Bullying and cyberbullying: what it is and how to protect yourself.
News reports are highlighting an ever-increasing number of cases of cyberbullying, some with dramatic outcomes (see incitement to suicide). Cyberbullying is a new form of psychological violence, an in...
What are Botnets? A Journey Through Malware, Cyber Threat Intelligence, and OSINT
The Internet provides a sea of information. We often talk on RHC about Open Source Intelligence (OSINT) and Cyber Threat Intelligence (CTI), i.e. those intelligence disciplines that deal with the rese...
Featured Articles

Penetration testing is an increasingly widespread practice in the field of cybersecurity. It is a real simulation of a cyber attack, conducted by a team of security experts, in order to identify and a...

How does a large organization with millions of user credentials circulating between production servers, web applications, mobile apps, and workstations, connecting to countless profiles, keep proper r...

Sophos recently announced the fixes for five independent security vulnerabilities found in its firewalls, some critical and others high and medium. The vulnerabilities have been fixed via automaticall...

In the previous article on Patch Management, we started talking about 4 fundamental pillars in the world of Cybersecurity. These four pillars are Patch Management, Hardening, Secure Code Development, ...

A critical security flaw related to memory corruption has been discovered in the popular 7-Zip archiver. This vulnerability can be exploited by attackers to cause denial-of-service conditions by creat...

Disloyal employees. Let’s find out who they are and how to protect ourselves from this growing threat.
In the digital age, cybersecurity is a critical issue for any company handling sensitive data. However, not all risks are external. In fact, employees themselves often pose a threat to an organization’s cybersecurity. They’re called “rogue employees.” These are company

Bullying and cyberbullying: what it is and how to protect yourself.
News reports are highlighting an ever-increasing number of cases of cyberbullying, some with dramatic outcomes (see incitement to suicide). Cyberbullying is a new form of psychological violence, an invasion and “misappropriation” of other people’s lives. According to a recent survey

What is Electronic Warfare (EW). Superiority in the Electromagnetic Spectrum
Electronic Warfare (EW) is one of the most sophisticated and strategically relevant disciplines in modern security. In an age dominated by technology, where information superiority can decide the outcome of conflicts and operations, electronic warfare is a key element for

What is SIM Swapping? Here’s how it works.
These days, smartphones are in practically everyone’s pockets. We use them for entertainment, sending messages, storing notes, taking photos, transferring money, and even “making phone calls,” which is what they were originally designed for. Our phones have become an essential

What are zero-day brokers? Discovering the underground market of security vulnerabilities
Zeroday brokers are intermediaries who buy and sell software vulnerabilities that are unknown to the manufacturers and organizations that use them. These vulnerabilities, known as “zerodays,” are exploited by cybercriminals to attack companies’ computer systems and networks. Zeroday brokers seek

Apache Tomcat DoS Vulnerability: CVE-2025-53506 Under Analysis
The Apache team recently fixed a denial-of-service (DoS) vulnerability classified as high severity. There’s a new inconvenient guest in data centers around the world. It’s called CVE-2025-53506 and it doesn’t make noise like ransomware, it doesn’t manifest itself with disturbing

What are Side Channel Attacks? How they work and how to defend data from cyber threat physics.
Redazione RHC - July 20th, 2025
Side Channel Attacks represent a sophisticated category of cyber threats that focus on weaknesses in security systems. These attacks differ from traditional techniques based on brute force or software vulnerabilities,...

What is Phishing as a Service (PaaS). Let’s explore cybercrime services and access some underground resources.
Redazione RHC - July 20th, 2025
"Phishing as a service" (PaaS) is a type of service offered by cybercriminals or illicit service providers that simplifies and automates the entire process of creating and distributing phishing attacks...

What is a False Flag in Cybersecurity: From its Origins to Its Use in Malware and National Security Attacks
Redazione RHC - July 20th, 2025
In the vast world of cybersecurity, an often controversial and highly intriguing practice is that of "false flags." This term, originally used in the context of military operations and intelligence,...

Chinese humanoid robot replaces its own battery and works 24 hours a day
Redazione RHC - July 20th, 2025
The presentation of the Walker S2 represents a major step forward in the operational autonomy of humanoid robots. Thanks to the ability to autonomously replace its own battery, the robot...
Sign up for the newsletter