Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Redhotcyber Banner Sito 970x120px Uscita 101125
Precedente Successivo

Latest news

Do you have Teams? You’re a Target! The Microsoft Platform is Targeted by States and Criminals Cyber News

Do you have Teams? You’re a Target! The Microsoft Platform is Targeted by States and Criminals

The Microsoft Teams collaboration platform has become a popular target for attackers, as its widespread adoption has made it a...
Marcello Filacchioni - October 8, 2025
A single data center on fire, an entire country in digital blackout: the case of South Korea Cyber News

A single data center on fire, an entire country in digital blackout: the case of South Korea

A fire at a government data center in South Korea has reduced the country's digital infrastructure to rubble and starkly...
Redazione RHC - October 7, 2025
Why does the United States buy rare earths from China despite its own reserves? Cyber News

Why does the United States buy rare earths from China despite its own reserves?

In recent years, the topic of rare earths has returned to the forefront of international debate, especially given China's dominant...
Silvia Felici - October 7, 2025
An 8-year-old critical bug in the Unity game engine poses risks to Android and Windows. Cyber News

An 8-year-old critical bug in the Unity game engine poses risks to Android and Windows.

A vulnerability has been discovered in the Unity game engine, which has been present since 2017. The issue can be...
Agostino Pellegrino - October 7, 2025
11 death sentences for online fraud. China deals a severe blow to cybercrime Cyber News

11 death sentences for online fraud. China deals a severe blow to cybercrime

Amid China's long battle against cross-border fraud, authorities have issued a verdict in one of the most high-profile cases in...
Marcello Filacchioni - October 6, 2025
Securing WebSocket Connections: Risk, Analysis, and Practical Measures Cybercrime

Securing WebSocket Connections: Risk, Analysis, and Practical Measures

WebSockets offer persistent two-way communication between client and server, essential for real-time applications like chat, gaming, dashboards, and notifications. However,...
Diego Bentivoglio - October 6, 2025

What is Zero Trust Security? A Journey into the Future of Security 2.0

What is Zero Trust? Why is it so important today and why is there so much talk about it? Zero Trust is an innovative approach that is increasingly gaining traction...

What are Common Vulnerabilities and Exposures (CVE)

The primary goal of computer security is vulnerability management. In achieving this goal, CVE helps specialists, who are an integral part of the information security community. If you're a reader...

What is Identity and Access Management (IAM)? Let’s find out how to protect your online identities.

How does a large organization with millions of user credentials circulating between production servers, web applications, mobile apps, and workstations, connecting to countless profiles, keep proper records of them? How...

New wave of Microsoft SharePoint Server attacks claims victims: over 100 organizations affected

We recently discussed a critical zero-day vulnerability, CVE-2025-53770, in Microsoft SharePoint Server, which bypasses the previous security flaw CVE-2025-49706. It was already known at the time that the vulnerability involved...

TIM’s Red Team Research discovers five CVEs on Eclipse GlassFish, one critical (score 9.8)

Thursday, July 16 was a significant day for the cybersecurity researchers of the Italian Red Team Research (RTR) team of TIM, which saw the publication of five new vulnerabilities (CVE)...

What is Secure Code Development? Discovering an essential practice in cybersecurity.

In the previous article on Patch Management, we started talking about 4 fundamental pillars in the world of Cybersecurity. These four pillars are Patch Management, Hardening, Secure Code Development, and...

What is Hardening: Discovering a Preemptive Strategy for Threat Mitigation

We often talk about "hardening" systems, but many people still don't know exactly what we're talking about. We've almost all discovered the pillars of cybersecurity, and among them are the...

Patch Management: The process to adopt to make your company more secure from cyber attacks

"In the dark forest of the digital world" (as Dante Alighieri would say today), cybersecurity has become a top priority for companies of all sizes. Constant cyber attacks make headlines...

What are security bugs? A journey through PoCs, exploits, bug bounty programs, and work.

A security bug, also known as a computer security bug, is a type of error or flaw in software that can be exploited by an attacker to compromise the security...

Vulnerability in 7-Zip: Attackers can perform denial-of-service attacks

A critical security flaw related to memory corruption has been discovered in the popular 7-Zip archiver. This vulnerability can be exploited by attackers to cause denial-of-service conditions by creating malicious...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE