Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Fortinet 320x100px
Redhotcyber Banner Sito 970x120px Uscita 101125

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Nessun autore trovato con i filtri selezionati.

Ultimi articoli di Redazione RHC

WhatsApp Blocked in Russia: Messaging App Faces Crackdown
The Russian Federation’s Roskomnadzor has announced that it continues to impose systematic restrictions on the messaging app WhatsApp due to violati...
CEO Scam: How to Protect Your Company from Business Email Compromise
This morning, Paragon Sec was contacted by an Italian company that had been the victim of a new fraud attempt known as the CEO Scam . The accounting d...
Shai-Hulud Worm Spreads Beyond npm, Attacks Maven
The Shai-Hulud worm has spread beyond the npm ecosystem and was discovered in Maven . Socket specialists noticed an infected package on Maven Central ...
11.7% of jobs could be replaced by artificial intelligence
Artificial intelligence is currently capable of performing work equivalent to 11.7% of US employment . And not just in theory: in terms of monetary va...
The market for “controlling” people is taking off on the Dark Web.
BI.ZONE experts analyzed over 3,500 advertisements on darknet platforms offering dossiers on specific individuals, known as “probiv” (finding). On...
Does Windows Suck? A Video by Dave Plummer, the Microsoft Engineer Who Created Task Manager
Dave Plummer, a highly regarded former senior engineer at Microsoft who led the development of several key Windows components, including Task Manager,...
China surpasses US in open-source AI models
China surpasses the United States in the global market for open-source artificial intelligence (AI) models. According to a November 26 Financial Times...
ENISA takes on the role of Root in the European Cybersecurity Initiative (CVE).
The European Union Agency for Cybersecurity (ENISA) has taken on the role of Root within the Common Vulnerabilities and Exposures (CVE) programme, bec...
Supply Chain Attack on OpenAI: Analytics Provider Mixpanel Compromised
OpenAI has confirmed a security incident at Mixpanel, a third-party analytics provider used for its APIs. According to the investigation, the cause of...
Be careful when using SSDs! Without power, you risk data loss
XDA Developers reminds us that using solid-state drives for long-term storage is risky. If SSDs are left without power for years, data can become corr...
Quantum Computing vs. Artificial Intelligence: Which Will Really Change the Future?
Quantum mechanics remains a complex and mysterious field, both difficult to explain and difficult to understand. This branch of physics studies the un...
ToddyCat APT Group Targets Microsoft 365 Email Security
Email security continues to be one of the most critical points in modern cyber attacks. While compromising a Windows domain is already a success for a...
Tor Boosts Security with Counter Galois Onion CGO Encryption
The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 R...
WormGPT 4: AI-Powered Cybercrime Tools on the Rise
Cybercriminals no longer need to convince ChatGPT or Claude Code to write malware or data-stealing scripts. A whole class of specialized language mode...
EU lawmakers push for Microsoft alternative to boost tech sovereignty
A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Thei...
Investment Scam Alert: How to Avoid Losing Thousands
Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in fro...
Trump Launches Genesis AI Mission to Revolutionize US Science
US President Donald Trump signed an executive order, ” Launching the Genesis Mission,” establishing a national program for the use of artificial i...
Cybersecurity in the Middle East: Egitto and Qatar Lead the Way
Global attention to cybersecurity continues to grow in a context dominated by digital transformation and the rapid spread of artificial intelligence (...
US States Crack Down on VPNs and Online Privacy for Minors
Several U.S. states are debating new restrictions that could significantly change traditional approaches to online privacy . Legislators in Wisconsin ...
Logitech Hit by Clop Ransomware Attack, Data Breach Exposed
Logitech representatives have notified authorities of a cyberattack and a serious data breach . The notorious Clop ransomware group, which has been ta...