Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Banner Desktop
Precedente Successivo

Latest news

Feed Wars: Pro-Israel PsyOps Land on TikTok and ChatGPT Cyber News

Feed Wars: Pro-Israel PsyOps Land on TikTok and ChatGPT

The Israeli government has awarded the American company Clock Tower X LLC a $6 million contract to conduct a large-scale...
Luca Vinciguerra - October 8, 2025
Do you have Teams? You’re a Target! The Microsoft Platform is Targeted by States and Criminals Cyber News

Do you have Teams? You’re a Target! The Microsoft Platform is Targeted by States and Criminals

The Microsoft Teams collaboration platform has become a popular target for attackers, as its widespread adoption has made it a...
Marcello Filacchioni - October 8, 2025
A single data center on fire, an entire country in digital blackout: the case of South Korea Cyber News

A single data center on fire, an entire country in digital blackout: the case of South Korea

A fire at a government data center in South Korea has reduced the country's digital infrastructure to rubble and starkly...
Redazione RHC - October 7, 2025
Why does the United States buy rare earths from China despite its own reserves? Cyber News

Why does the United States buy rare earths from China despite its own reserves?

In recent years, the topic of rare earths has returned to the forefront of international debate, especially given China's dominant...
Silvia Felici - October 7, 2025
An 8-year-old critical bug in the Unity game engine poses risks to Android and Windows. Cyber News

An 8-year-old critical bug in the Unity game engine poses risks to Android and Windows.

A vulnerability has been discovered in the Unity game engine, which has been present since 2017. The issue can be...
Agostino Pellegrino - October 7, 2025
11 death sentences for online fraud. China deals a severe blow to cybercrime Cyber News

11 death sentences for online fraud. China deals a severe blow to cybercrime

Amid China's long battle against cross-border fraud, authorities have issued a verdict in one of the most high-profile cases in...
Marcello Filacchioni - October 6, 2025

What are penetration tests, why are they done, who performs them, and the benefits for organizations.

Penetration testing is an increasingly widespread practice in the field of cybersecurity. It is a real simulation of a cyber attack, conducted by a team of security experts, in order...

What is Zero Trust Security? A Journey into the Future of Security 2.0

What is Zero Trust? Why is it so important today and why is there so much talk about it? Zero Trust is an innovative approach that is increasingly gaining traction...

What are Common Vulnerabilities and Exposures (CVE)

The primary goal of computer security is vulnerability management. In achieving this goal, CVE helps specialists, who are an integral part of the information security community. If you're a reader...

What is Identity and Access Management (IAM)? Let’s find out how to protect your online identities.

How does a large organization with millions of user credentials circulating between production servers, web applications, mobile apps, and workstations, connecting to countless profiles, keep proper records of them? How...

New wave of Microsoft SharePoint Server attacks claims victims: over 100 organizations affected

We recently discussed a critical zero-day vulnerability, CVE-2025-53770, in Microsoft SharePoint Server, which bypasses the previous security flaw CVE-2025-49706. It was already known at the time that the vulnerability involved...

TIM’s Red Team Research discovers five CVEs on Eclipse GlassFish, one critical (score 9.8)

Thursday, July 16 was a significant day for the cybersecurity researchers of the Italian Red Team Research (RTR) team of TIM, which saw the publication of five new vulnerabilities (CVE)...

What is Secure Code Development? Discovering an essential practice in cybersecurity.

In the previous article on Patch Management, we started talking about 4 fundamental pillars in the world of Cybersecurity. These four pillars are Patch Management, Hardening, Secure Code Development, and...

What is Hardening: Discovering a Preemptive Strategy for Threat Mitigation

We often talk about "hardening" systems, but many people still don't know exactly what we're talking about. We've almost all discovered the pillars of cybersecurity, and among them are the...

Patch Management: The process to adopt to make your company more secure from cyber attacks

"In the dark forest of the digital world" (as Dante Alighieri would say today), cybersecurity has become a top priority for companies of all sizes. Constant cyber attacks make headlines...

What are security bugs? A journey through PoCs, exploits, bug bounty programs, and work.

A security bug, also known as a computer security bug, is a type of error or flaw in software that can be exploited by an attacker to compromise the security...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE