Red Hot Cyber. The Cybersecurity Blog
What are penetration tests, why are they done, who performs them, and the benefits for organizations.
Penetration testing is an increasingly widespread practice in the field of cybersecurity. It is a real simulation of a cyber attack, conducted by a team of security experts, in order to identify and a...
What is Identity and Access Management (IAM)? Let’s find out how to protect your online identities.
How does a large organization with millions of user credentials circulating between production servers, web applications, mobile apps, and workstations, connecting to countless profiles, keep proper r...
Sophos fixes five vulnerabilities in Sophos Firewall, two of which are rated critical
Sophos recently announced the fixes for five independent security vulnerabilities found in its firewalls, some critical and others high and medium. The vulnerabilities have been fixed via automaticall...
What is Secure Code Development? Discovering an essential practice in cybersecurity.
In the previous article on Patch Management, we started talking about 4 fundamental pillars in the world of Cybersecurity. These four pillars are Patch Management, Hardening, Secure Code Development, ...
Vulnerability in 7-Zip: Attackers can perform denial-of-service attacks
A critical security flaw related to memory corruption has been discovered in the popular 7-Zip archiver. This vulnerability can be exploited by attackers to cause denial-of-service conditions by creat...
What are Side Channel Attacks? How they work and how to defend data from cyber threat physics.
Side Channel Attacks represent a sophisticated category of cyber threats that focus on weaknesses in security systems. These attacks differ from traditional techniques based on brute force or software...
What is cyber hacktivism? History, motivations, hacking, consequences, and evolution.
The term “hacktivism” is a combination of the English terms “hacking” and “hacktivism” and was coined to describe the use of computer hacking for political or socia...
Disloyal employees. Let’s find out who they are and how to protect ourselves from this growing threat.
In the digital age, cybersecurity is a critical issue for any company handling sensitive data. However, not all risks are external. In fact, employees themselves often pose a threat to an organization...
Bullying and cyberbullying: what it is and how to protect yourself.
News reports are highlighting an ever-increasing number of cases of cyberbullying, some with dramatic outcomes (see incitement to suicide). Cyberbullying is a new form of psychological violence, an in...
What are Botnets? A Journey Through Malware, Cyber Threat Intelligence, and OSINT
The Internet provides a sea of information. We often talk on RHC about Open Source Intelligence (OSINT) and Cyber Threat Intelligence (CTI), i.e. those intelligence disciplines that deal with the rese...
Featured Articles

Penetration testing is an increasingly widespread practice in the field of cybersecurity. It is a real simulation of a cyber attack, conducted by a team of security experts, in order to identify and a...

How does a large organization with millions of user credentials circulating between production servers, web applications, mobile apps, and workstations, connecting to countless profiles, keep proper r...

Sophos recently announced the fixes for five independent security vulnerabilities found in its firewalls, some critical and others high and medium. The vulnerabilities have been fixed via automaticall...

In the previous article on Patch Management, we started talking about 4 fundamental pillars in the world of Cybersecurity. These four pillars are Patch Management, Hardening, Secure Code Development, ...

A critical security flaw related to memory corruption has been discovered in the popular 7-Zip archiver. This vulnerability can be exploited by attackers to cause denial-of-service conditions by creat...

Magnus Carlsen beats ChatGPT at chess without losing a piece!
Magnus Carlsen beat ChatGPT at chess without losing a single piece, while his virtual opponent lost all his pawns. The Norwegian grandmaster posted screenshots of the game on the social network X on July 10. The artificial intelligence admitted defeat

Magnus Carlsen beats ChatGPT at chess without losing a piece!
Magnus Carlsen beat ChatGPT at chess without losing a single piece, while his virtual opponent lost all his pawns. The Norwegian grandmaster posted screenshots of the game on the social network X on July 10. The artificial intelligence admitted defeat

Putin imposes restrictions on foreign software that has “strangled” Russia
The Kremlin press office reported that Russian President Vladimir Putin has instructed the government to develop additional restrictions on software (including “communications services”)produced in hostile countries by September 1, 2025. The list of instructions was drawn up following a meeting

How an LLM Really Works: Costs, Infrastructure, and the Technical Choices Behind Big Language Models
In recent years, large language models (LLM, Large Language Models) such as GPT, Claude, or LLaMA have demonstrated extraordinary capabilities in understanding and generating natural language. However, behind the scenes, running an LLM is no child’s play: it requires significant

Sophos fixes vulnerabilities in Intercept X for Windows
Sophos announced that it has resolved three separate security vulnerabilities in Sophos Intercept X for Windows and its installer. These vulnerabilities, designated CVE-2024-13972, CVE-2025-7433, and CVE-2025-7472, have been rated High severity. The security bulletin, with Release ID sophos-sa-20250717-cix-lpe, was updated

Three score 10 bugs have been detected in Cisco ISE and ISE-PIC: urgent updates required.
Several vulnerabilities have been identified in the Cisco Identity Services Engine (ISE) and Cisco ISE Passive Identity Connector (ISE-PIC) products that could allow a remote attacker to execute arbitrary commands on the underlying operating system with administrative privileges. Cisco has

Gmail introduces Shielded Email. Temporary email to fight spam and protect your privacy.
Redazione RHC - July 19th, 2025
Google continues to actively develop Gmail, adding new features with elements of artificial intelligence to the email service. These updates make using email more convenient, but at the same time,...

Google files suit against the BadBox2.0 botnet! A thought-provoking lawsuit against unknown individuals
Redazione RHC - July 19th, 2025
Google has filed a lawsuit against the anonymous operators of the Android BadBox 2.0 botnet, accusing them of orchestrating a global fraud targeting the company's advertising platforms. BadBox is Android...

Jen-Hsun Huang: “I was born Chinese and became Chinese-American.” The ban on AI chips in China is a grave mistake.
Redazione RHC - July 19th, 2025
According to Fast Technology on July 18, Jen-Hsun Huang told Chinese media about his origins, explaining that he was born Chinese and then became Chinese-American. He emphasized how China is...

What is Social Engineering? Uncovering an increasingly pervasive threat.
Redazione RHC - July 19th, 2025
Social engineering is a psychological manipulation technique used to gain unauthorized access or information. Attackers exploit people's natural tendency to rely on trust and courtesy to convince them to provide...
Sign up for the newsletter