Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

UK: Strict rules for online age verification. Pornhub and YouPorn will comply.
Di Redazione RHC - 25/07/2025

Starting Friday, adults in the UK who try to access pornographywill have to prove they are over 18, under some of the strictest regulations in the world. The change means that, instead of having to pr...

Operation Checkmate: A major law enforcement coup. BlackSuit has been apprehended!
Di Redazione RHC - 25/07/2025

During a coordinated international operation dubbed Operation Checkmate, law enforcement officials have dealt a major blow to the BlackSuit ransomware group (onion link here, which has fallen into the...

What does a CISO do? Meet the Chief Information Security Officer: a beautiful but demanding position.
Di Redazione RHC - 24/07/2025

How many times have we heard this acronym: CISO? But how many of us don’t know precisely what it means or have little in-depth knowledge of what a Chief Information Security Officer does? This p...

SharePoint and CrowdStrike: Two Faces of the Same Digital Fragility
Di Redazione RHC - 24/07/2025

In recent days, the global digital landscape has been rocked by a cybersecurity bug that affected on-premise Microsoft SharePoint servers, exposing thousands of organizations to cyber attacks. These a...

ToolShell: Microsoft SharePoint Zero-Day Vulnerability Has Been Under Attack Since Early July
Di Redazione RHC - 24/07/2025

According to cybersecurity experts, several Chinese hacker groups are exploiting a series of zero-day vulnerabilities in Microsoft SharePoint in their attacks. In particular, it emerged that attackers...

How to Start a Cyber Security Program: The First Steps

Cybersecurity has become a crucial component for protecting corporate information and sensitive data. Starting a cybersecurity program is not only a necessity, but a must for any organization that wants to protect its information assets. But how do you begin

16 flaws discovered in MediaTek chips: smartphones and smart TVs at risk!

- July 22nd, 2025

In an age where connectivity is ubiquitous and smart devices are an integral part of our daily lives, cybersecurity is no longer optional, but a necessity. Every month, major chip...

  

Sophos fixes five vulnerabilities in Sophos Firewall, two of which are rated critical

- July 22nd, 2025

Sophos recently announced the fixes for five independent security vulnerabilities found in its firewalls, some critical and others high and medium. The vulnerabilities have been fixed via automatically distributed hotfixes,...

  

TIM’s Red Team Research discovers five CVEs on Eclipse GlassFish, one critical (score 9.8)

- July 21st, 2025

Thursday, July 16 was a significant day for the cybersecurity researchers of the Italian Red Team Research (RTR) team of TIM, which saw the publication of five new vulnerabilities (CVE)...

  

What is Secure Code Development? Discovering an essential practice in cybersecurity.

- July 21st, 2025

In the previous article on Patch Management, we started talking about 4 fundamental pillars in the world of Cybersecurity. These four pillars are Patch Management, Hardening, Secure Code Development, and...

  

Sign up for the newsletter