Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Enterprise BusinessLog 320x200 1
970x20 Itcentric

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Redazione RHC
(12314 articoli, 10918 italiano, 1396 inglese)12314 articoli
10918 italiano, 1396 inglese

The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.

Ultimi articoli di Redazione RHC

Aisuru Botnet Unleashes 29.7 Tbps DDoS Attack, Cloudflare Mitigates
A botnet service called Aisuru offers an army of compromised IoT devices and routers to launch high-traffic DDoS attacks. In just three months, the ma...
Critical Vulnerability in Iskra iHUB Devices Exposed
A serious security vulnerability has been discovered in smart metering infrastructure, which could expose utility networks to remote takeover risks. T...
Roblox Down Russia
Today, the Roblox gaming platform went offline in Russia. However, international services that monitor network outages reported no issues during the s...
Inside Lazarus! The fake candidate who fooled North Korean cyber spies
A joint investigation by BCA LTD, NorthScan, and ANY.RUN has exposed one of North Korea’s most secretive hacking schemes. Under the guise of routine...
Kawasaki CORLEO Robot Quadrupede for Human Transport by 2035
Kawasaki Heavy Industries plans to launch a quadruped robot capable of carrying humans in 2035. Kawasaki Heavy Industries announced on December 3 that...
Candle Subsea Cable Revolutionizes Asia-Pacific Internet Connectivity
70 million simultaneous 8K videos at 570 Tbps ! This is a staggering amount of transport power in a submarine cable and will change internet access in...
Google Chrome 143 Patch Fixes Critical V8 JavaScript Vulnerability
Google has released Chrome 143 for Windows, macOS, and Linux; the release contains an important patch. The new version ( 143.0.7499.40 for Linux and 1...
Managing AI Agents: Mitigating Security Risks in Autonomous Systems
The widespread adoption of artificial intelligence in businesses is profoundly transforming operational processes and, at the same time, introducing n...
Mistral AI Unveils Powerful Open Source Models for Advanced AI Applications
French company Mistral AI has unveiled its Mistral 3 line of models, making them fully open source under the Apache 2.0 license . The series includes ...
Maha Grass APT Group Unleashes StreamSpy Malware Attacks
The Patchwork cyber espionage group — also known as Hangover or Dropping Elephant and internally tracked by QiAnXin as APT-Q-36 — has been active ...
Digital Crime Among Teenagers: Temporary Involvement
Dutch authorities have published data showing that adolescents’ involvement in cybercrime is usually temporary. An analysis prepared by the House of...
Porsche Russia Alarm Issues Spark Widespread Vehicle Immobilization
Porsche owners in Russia are increasingly experiencing problems with factory alarms, making it impossible to use their cars. Their cars won’t start,...
Cryptomixer Shut Down: Europol Cracks Down on $1.3B Bitcoin Mixing Service
Law enforcement agencies in Switzerland and Germany have reported the dismantling of Cryptomixer , a major mixing service operating since 2016 that he...
ShadyPanda Malware Infects 4.3M Browsers with Chrome Edge Extensions
Researchers at Koi Security described a multi-stage operation called ShadyPanda . Over the course of seven years, attackers released seemingly useful ...
Phishing Attacks Surge in Black Friday Season: Stay Vigilant
This year, too, cybercriminals are taking advantage of seasonal shopping periods to spread phishing websites and fraudulent promotions, aiming to stea...