Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Red Hot Cyber Academy
Red Hot Cyber Academy

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

What are penetration tests, why are they done, who performs them, and the benefits for organizations.
Di Redazione RHC - 22/07/2025

Penetration testing is an increasingly widespread practice in the field of cybersecurity. It is a real simulation of a cyber attack, conducted by a team of security experts, in order to identify and a...

What is Identity and Access Management (IAM)? Let’s find out how to protect your online identities.
Di Redazione RHC - 22/07/2025

How does a large organization with millions of user credentials circulating between production servers, web applications, mobile apps, and workstations, connecting to countless profiles, keep proper r...

Sophos fixes five vulnerabilities in Sophos Firewall, two of which are rated critical
Di Redazione RHC - 22/07/2025

Sophos recently announced the fixes for five independent security vulnerabilities found in its firewalls, some critical and others high and medium. The vulnerabilities have been fixed via automaticall...

What is Secure Code Development? Discovering an essential practice in cybersecurity.
Di Redazione RHC - 21/07/2025

In the previous article on Patch Management, we started talking about 4 fundamental pillars in the world of Cybersecurity. These four pillars are Patch Management, Hardening, Secure Code Development, ...

Vulnerability in 7-Zip: Attackers can perform denial-of-service attacks
Di Redazione RHC - 21/07/2025

A critical security flaw related to memory corruption has been discovered in the popular 7-Zip archiver. This vulnerability can be exploited by attackers to cause denial-of-service conditions by creat...

Magnus Carlsen beats ChatGPT at chess without losing a piece!

Magnus Carlsen beat ChatGPT at chess without losing a single piece, while his virtual opponent lost all his pawns. The Norwegian grandmaster posted screenshots of the game on the social network X on July 10. The artificial intelligence admitted defeat

Magnus Carlsen beats ChatGPT at chess without losing a piece!

Magnus Carlsen beat ChatGPT at chess without losing a single piece, while his virtual opponent lost all his pawns. The Norwegian grandmaster posted screenshots of the game on the social network X on July 10. The artificial intelligence admitted defeat

Putin imposes restrictions on foreign software that has “strangled” Russia

The Kremlin press office reported that Russian President Vladimir Putin has instructed the government to develop additional restrictions on software (including “communications services”)produced in hostile countries by September 1, 2025. The list of instructions was drawn up following a meeting

Sophos fixes vulnerabilities in Intercept X for Windows

Sophos announced that it has resolved three separate security vulnerabilities in Sophos Intercept X for Windows and its installer. These vulnerabilities, designated CVE-2024-13972, CVE-2025-7433, and CVE-2025-7472, have been rated High severity. The security bulletin, with Release ID sophos-sa-20250717-cix-lpe, was updated

Gmail introduces Shielded Email. Temporary email to fight spam and protect your privacy.

- July 19th, 2025

Google continues to actively develop Gmail, adding new features with elements of artificial intelligence to the email service. These updates make using email more convenient, but at the same time,...

  

Google files suit against the BadBox2.0 botnet! A thought-provoking lawsuit against unknown individuals

- July 19th, 2025

Google has filed a lawsuit against the anonymous operators of the Android BadBox 2.0 botnet, accusing them of orchestrating a global fraud targeting the company's advertising platforms. BadBox is Android...

  

Jen-Hsun Huang: “I was born Chinese and became Chinese-American.” The ban on AI chips in China is a grave mistake.

- July 19th, 2025

According to Fast Technology on July 18, Jen-Hsun Huang told Chinese media about his origins, explaining that he was born Chinese and then became Chinese-American. He emphasized how China is...

  

What is Social Engineering? Uncovering an increasingly pervasive threat.

- July 19th, 2025

Social engineering is a psychological manipulation technique used to gain unauthorized access or information. Attackers exploit people's natural tendency to rely on trust and courtesy to convince them to provide...

  

Sign up for the newsletter