Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Red Hot Cyber Academy

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

What is Secure Code Development? Discovering an essential practice in cybersecurity.
Di Redazione RHC - 21/07/2025

In the previous article on Patch Management, we started talking about 4 fundamental pillars in the world of Cybersecurity. These four pillars are Patch Management, Hardening, Secure Code Development, ...

Vulnerability in 7-Zip: Attackers can perform denial-of-service attacks
Di Redazione RHC - 21/07/2025

A critical security flaw related to memory corruption has been discovered in the popular 7-Zip archiver. This vulnerability can be exploited by attackers to cause denial-of-service conditions by creat...

What are Side Channel Attacks? How they work and how to defend data from cyber threat physics.
Di Redazione RHC - 20/07/2025

Side Channel Attacks represent a sophisticated category of cyber threats that focus on weaknesses in security systems. These attacks differ from traditional techniques based on brute force or software...

What is cyber hacktivism? History, motivations, hacking, consequences, and evolution.
Di Redazione RHC - 19/07/2025

The term “hacktivism” is a combination of the English terms “hacking” and “hacktivism” and was coined to describe the use of computer hacking for political or socia...

Disloyal employees. Let’s find out who they are and how to protect ourselves from this growing threat.
Di Redazione RHC - 19/07/2025

In the digital age, cybersecurity is a critical issue for any company handling sensitive data. However, not all risks are external. In fact, employees themselves often pose a threat to an organization...

The Threat Actor 888 claims responsibility for a breach at Nokia.

- July 10th, 2024

A malicious actor, known by the alias "888," recently claimed responsibility for disclosing sensitive data belonging to Nokia. The attack, which occurred in July 2024, compromised a wide range of...

  

Citrix Netscaler ADC and Gateway plagued by serious DOS and Open Redirect flaw

- July 9th, 2024

Two vulnerabilities have been identified in NetScaler ADC and NetScaler Gateway. Affected Versions: The following supported versions of NetScaler ADC and NetScaler Gateway are vulnerable: These devices are widely used...

  

Massive Data Exposure on X (Twitter) Affects 200 Million Users

- July 8th, 2024

Recently, X (Twitter) experienced a massive data exposure, compromising nearly 200 million user records. This incident could be one of the largest user data exposures in recent history, jeopardizing the...

  

Alleged NATO Data BreachAlleged NATO Data Breach: 643 CSV Files with User Data and Server Details Leaked

- July 8th, 2024

A threat actor claims to have leaked sensitive data from NATO - TIDE (Think-Tank for Information Decision and Execution Superiority). NATO-TIDE (Think-Tank for Information Decision and Execution Superiority) is a...

  

Sign up for the newsletter