Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

What is Secure Code Development? Discovering an essential practice in cybersecurity.
Di Redazione RHC - 21/07/2025

In the previous article on Patch Management, we started talking about 4 fundamental pillars in the world of Cybersecurity. These four pillars are Patch Management, Hardening, Secure Code Development, ...

Vulnerability in 7-Zip: Attackers can perform denial-of-service attacks
Di Redazione RHC - 21/07/2025

A critical security flaw related to memory corruption has been discovered in the popular 7-Zip archiver. This vulnerability can be exploited by attackers to cause denial-of-service conditions by creat...

What are Side Channel Attacks? How they work and how to defend data from cyber threat physics.
Di Redazione RHC - 20/07/2025

Side Channel Attacks represent a sophisticated category of cyber threats that focus on weaknesses in security systems. These attacks differ from traditional techniques based on brute force or software...

What is cyber hacktivism? History, motivations, hacking, consequences, and evolution.
Di Redazione RHC - 19/07/2025

The term “hacktivism” is a combination of the English terms “hacking” and “hacktivism” and was coined to describe the use of computer hacking for political or socia...

Disloyal employees. Let’s find out who they are and how to protect ourselves from this growing threat.
Di Redazione RHC - 19/07/2025

In the digital age, cybersecurity is a critical issue for any company handling sensitive data. However, not all risks are external. In fact, employees themselves often pose a threat to an organization...

Access to UK Accounting System for Sale: 600 Clients and 1TB of Data at Risk

- July 8th, 2024

A malicious actor is allegedly selling access to an RDWeb system in the United Kingdom, belonging to an accounting firm. This breach represents a serious threat to the security of...

  

Ticketmaster Breach: 30,000 Free Tickets Released

- July 8th, 2024

After claiming to have stolen 170,000 tickets for Taylor Swift's ERAS Tour, the hacker group Sp1d3rHunters today announced they have distributed over 30,000 more tickets for high-profile events. The allegedly...

  

China: 7.5 Million Tourist Data Stolen!

- July 8th, 2024

On the morning of July 6, 2024, a user known as "BlackKing" revealed a significant data breach involving a Chinese travel and tourism platform on a hacking forum. This information...

  

Critical Vulnerability in MongoDB Compass: CVE-2024-6376 Exposes Systems to Code Injection Risks

- July 8th, 2024

A critical security vulnerability, identified as CVE-2024-6376, has been discovered in MongoDB Compass, a widely-used graphical interface for MongoDB data management. This security flaw could have serious repercussions, including data...

  

Sign up for the newsletter