Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Banner Mobile
TM RedHotCyber 970x120 042543

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Redazione RHC
(12314 articoli, 10918 italiano, 1396 inglese)12314 articoli
10918 italiano, 1396 inglese

The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.

Ultimi articoli di Redazione RHC

Human Washing Machine Launched: Japan’s Science Unveils Unique Device
Japanese company Science has launched a washing machine for humans. The 2.30-meter-long capsule bathes a person in 15 minutes and attracted considerab...
Brazilian Systems Targeted in Sophisticated OAST Exploit Campaign
Security researchers have discovered a sophisticated exploit campaign that leverages a private out-of-band application security testing (OAST) service...
Australian Man Jailed for Evil Twin Wi-Fi Scam Targeting Airline Passengers
An Australian court has convicted a 44-year-old man who stole the personal data of airline passengers and airport visitors over several months . He wa...
KrakenBite Phishing Service Exposed
The underground cybercrime market continues to evolve rapidly, fueled by specialized groups designing and selling tools for increasingly sophisticated...
ADC Aerospace Hit by Play Ransomware Attack, Data Breach Feared
American aviation and defense components manufacturer ADC Aerospace has found itself in the spotlight due to a possible cyber attack by the Play ranso...
Calendar Subscriptions: A Hidden Danger in Your Digital Life
Digital calendars have long been a convenient way to keep track of daily activities, but new research from Bitsight shows that this familiar tool can ...
Airbus A320 Recall Due to ELAC System Failure Caused by Solar Flares
Airbus has announced the recall of approximately 6,500 A320 aircraft due to potential failures in the ELAC control system caused by powerful solar fla...
OpenAI Faces Fierce Competition from Google’s Gemini 3
OpenAI, a company valued at around $500 billion, is facing increasingly fierce technical competition . Google’s latest version of Gemini 3 , in part...
Leonardo’s Michelangelo Dome: AI-Powered Defense Against Hypersonic Threats
Italian defense company Leonardo has unveiled its new Michelangelo Dome system . According to the company, it is designed to counter hypersonic missil...
Windows 11 Password Issue: Microsoft Warns of Invisible Icon Bug
Microsoft has warned users of a Windows 11 glitch: after the release of updates starting in August 2025 , the password-based sign-in button may disapp...
CISA Warns of OpenPLC ScadaBR Vulnerability Exploitation
The Cybersecurity and Infrastructure Security Agency (CISA) has expanded its list of exploited vulnerabilities (KEVs), reporting a new vulnerability a...
The Power of A* Algorithm in Artificial Intelligence and Robotics
Nearly everything artificial intelligence does today is based on a simple but fundamental idea: any problem can be reduced to finding a path from a st...
WhatsApp Messages Contain Hidden GPS Data, Expert Warns
According to computer forensics expert Elom Daniel, WhatsApp messages can contain hidden geolocation data even when the user hasn’t intentionally sh...
DeepSeekMath-V2 Revolutionizes Math with AI-Powered Proof Verification
The Chinese company DeepSeek has introduced a new specialized model for solving mathematical problems , DeepSeekMath-V2. This large-scale language mod...
Shai-Hulud Attack: npm Supply Chain Compromised Again
The npm ecosystem is once again at the center of a large-scale supply chain attack attributed to the Shai-Hulud campaign. This wave has led to the rel...