Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Looking for Volodymyr Tymoshchuk! 11 million dollars for the Nefilim hacker
Di Redazione RHC - 12/09/2025

The U.S. Department of Justice has indicted Ukrainian Volodymyr Tymoshchuk on seven counts of computer hacking and extortion. He is considered one of the most dangerous hackers of recent years. The in...

In Nepal, people are dying for social media! 19 people lost their lives trying to get Facebook back
Di Redazione RHC - 09/09/2025

In a dramatic reversal, Nepal has lifted the nationwide social media blackout imposed last week after it sparked massive youth protests and caused at least 19 deaths, according to local media. The dec...

Xi Jinping and the Chinese APT’s Ambition
Di Alessio Stefan - 08/09/2025

The post-COVID macro political movements, including ongoing conflicts, have prompted a majority of states to shift their medium- to long-term political objectives. Clearly, a paradigm shift has been v...

Salesloft Cyber Attack: Chatbot Drift Temporarily Disabled
Di Redazione RHC - 07/09/2025

Salesloft announced that it would temporarily deactivate its AI-powered chatbot Drift on September 5, after several companies were hit by a massive supply chain attack. The incident resulted in the ma...

Discover the Dark Web: Access, Secrets, and Helpful Links to the Onion Network
Di Redazione RHC - 06/09/2025

The Dark Web is a part of the internet that cannot be reached with standard browsers (Chrome, Firefox, Edge). To access it, you need to use specific tools like the Tor Browser, which guarantees anonym...

16 flaws discovered in MediaTek chips: smartphones and smart TVs at risk!

In an age where connectivity is ubiquitous and smart devices are an integral part of our daily lives, cybersecurity is no longer optional, but a neces...
Redazione RHC - 22/07/2025 - 07:39

Sophos fixes five vulnerabilities in Sophos Firewall, two of which are rated critical

Sophos recently announced the fixes for five independent security vulnerabilities found in its firewalls, some critical and others high and medium. Th...
Redazione RHC - 22/07/2025 - 07:35

TIM’s Red Team Research discovers five CVEs on Eclipse GlassFish, one critical (score 9.8)

Thursday, July 16 was a significant day for the cybersecurity researchers of the Italian Red Team Research (RTR) team of TIM, which saw the publicatio...
Redazione RHC - 21/07/2025 - 08:45

What is Secure Code Development? Discovering an essential practice in cybersecurity.

In the previous article on Patch Management, we started talking about 4 fundamental pillars in the world of Cybersecurity. These four pillars are Patc...
Redazione RHC - 21/07/2025 - 08:20

What is Hardening: Discovering a Preemptive Strategy for Threat Mitigation

We often talk about "hardening" systems, but many people still don't know exactly what we're talking about. We've almost all discovered the pillars of...
Redazione RHC - 21/07/2025 - 08:18

Patch Management: The process to adopt to make your company more secure from cyber attacks

"In the dark forest of the digital world" (as Dante Alighieri would say today), cybersecurity has become a top priority for companies of all sizes. Co...
Redazione RHC - 21/07/2025 - 08:15
1 75 76 77 78 79 138

16 flaws discovered in MediaTek chips: smartphones and smart TVs at risk!

- July 22nd, 2025

In an age where connectivity is ubiquitous and smart devices are an integral part of our daily lives, cybersecurity is no longer optional, but a necessity. Every month, major chip...

  

Sophos fixes five vulnerabilities in Sophos Firewall, two of which are rated critical

- July 22nd, 2025

Sophos recently announced the fixes for five independent security vulnerabilities found in its firewalls, some critical and others high and medium. The vulnerabilities have been fixed via automatically distributed hotfixes,...

  

TIM’s Red Team Research discovers five CVEs on Eclipse GlassFish, one critical (score 9.8)

- July 21st, 2025

Thursday, July 16 was a significant day for the cybersecurity researchers of the Italian Red Team Research (RTR) team of TIM, which saw the publication of five new vulnerabilities (CVE)...

  

What is Secure Code Development? Discovering an essential practice in cybersecurity.

- July 21st, 2025

In the previous article on Patch Management, we started talking about 4 fundamental pillars in the world of Cybersecurity. These four pillars are Patch Management, Hardening, Secure Code Development, and...

  

What is Hardening: Discovering a Preemptive Strategy for Threat Mitigation

- July 21st, 2025

We often talk about "hardening" systems, but many people still don't know exactly what we're talking about. We've almost all discovered the pillars of cybersecurity, and among them are the...

  

Patch Management: The process to adopt to make your company more secure from cyber attacks

- July 21st, 2025

"In the dark forest of the digital world" (as Dante Alighieri would say today), cybersecurity has become a top priority for companies of all sizes. Constant cyber attacks make headlines...

  

Sign up for the newsletter