Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

What are Side Channel Attacks? How they work and how to defend data from cyber threat physics.
Di Redazione RHC - 20/07/2025

Side Channel Attacks represent a sophisticated category of cyber threats that focus on weaknesses in security systems. These attacks differ from traditional techniques based on brute force or software...

What is cyber hacktivism? History, motivations, hacking, consequences, and evolution.
Di Redazione RHC - 19/07/2025

The term “hacktivism” is a combination of the English terms “hacking” and “hacktivism” and was coined to describe the use of computer hacking for political or socia...

Disloyal employees. Let’s find out who they are and how to protect ourselves from this growing threat.
Di Redazione RHC - 19/07/2025

In the digital age, cybersecurity is a critical issue for any company handling sensitive data. However, not all risks are external. In fact, employees themselves often pose a threat to an organization...

Bullying and cyberbullying: what it is and how to protect yourself.
Di Redazione RHC - 19/07/2025

News reports are highlighting an ever-increasing number of cases of cyberbullying, some with dramatic outcomes (see incitement to suicide). Cyberbullying is a new form of psychological violence, an in...

What are Botnets? A Journey Through Malware, Cyber Threat Intelligence, and OSINT
Di Redazione RHC - 16/07/2025

The Internet provides a sea of information. We often talk on RHC about Open Source Intelligence (OSINT) and Cyber Threat Intelligence (CTI), i.e. those intelligence disciplines that deal with the rese...

The new version of the Konfety malware uses advanced evasion techniques

A new version of the Android malware called Konfety has become even more sophisticated: specialists at Zimperium zLabs have discovered an improved variant that uses non-standard ZIP archives and loads encrypted code during execution. These techniques allow the malware to

A study shows a shocking truth: 98.5% of passwords are weak!

In a new analysis based on 10 million compromised passwords, Specops has demonstrated how vulnerable corporate networks remain to human error. All passwords were extracted from a list of over a billion leaks. The results were alarming: only 1.5% of

Operation Eastwood: Pro-Russian hacker group NoName057(16) dismantled

As part of the investigations conducted by the Rome Public Prosecutor’s Office and coordinated by the National Anti-Mafia and Anti-Terrorism Directorate, the Postal Police has completed important investigative activities in Operation Eastwood against the pro-Russian hacker group known as “NoName057(16)”,

What is Doxing and How Can It Change Your Online Life?

Doxing (short for “dropping dox,” sometimes written as Doxxing) is the act of revealing personal information about someone online, such as their real name, home address, workplace, phone number, financial information, and other personal information. This information is then released

Putin imposes restrictions on foreign software that has “strangled” Russia

- July 18th, 2025

The Kremlin press office reported that Russian President Vladimir Putin has instructed the government to develop additional restrictions on software (including "communications services")produced in hostile countries by September 1, 2025....

  

How an LLM Really Works: Costs, Infrastructure, and the Technical Choices Behind Big Language Models

- July 18th, 2025

In recent years, large language models (LLM, Large Language Models) such as GPT, Claude, or LLaMA have demonstrated extraordinary capabilities in understanding and generating natural language. However, behind the scenes,...

  

Sophos fixes vulnerabilities in Intercept X for Windows

- July 18th, 2025

Sophos announced that it has resolved three separate security vulnerabilities in Sophos Intercept X for Windows and its installer. These vulnerabilities, designated CVE-2024-13972, CVE-2025-7433, and CVE-2025-7472, have been rated High...

  

Three score 10 bugs have been detected in Cisco ISE and ISE-PIC: urgent updates required.

- July 18th, 2025

Several vulnerabilities have been identified in the Cisco Identity Services Engine (ISE) and Cisco ISE Passive Identity Connector (ISE-PIC) products that could allow a remote attacker to execute arbitrary commands...

  

Sign up for the newsletter