Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
320x100 Itcentric
Crowdstriker 970×120

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Redazione RHC
(12311 articoli, 10916 italiano, 1395 inglese)12311 articoli
10916 italiano, 1395 inglese

The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.

Ultimi articoli di Redazione RHC

Let the hunt begin! Critical 7-Zip bug puts millions of users at risk.
Millions of users are exposed to the risk of malware infections and system compromise due to hackers’ active exploitation of a critical remote code ...
Python to Rust: A More Secure Future for the Programming Language
Two CPython developers have proposed adding the Rust programming language to the Python codebase . Emma Smith and a colleague have published a Prelimi...
Multi-threaded Hacking: US Pioneers Automated Operations with AI Agents
In recent months, a new cyber operations infrastructure has been developing in the United States, in which automated agents are becoming not just a su...
WhatsApp data leak: 3.5 billion numbers “stolen” by researchers at the University of Vienna
The scale of the leak, described by a team from the University of Vienna , demonstrates how dangerous the familiar contact search function of popular ...
Google launches Gemini 3, its most advanced artificial intelligence model
Google has announced the launch of Gemini 3, the next generation of its flagship artificial intelligence model, which the company is integrating into ...
CISA’s ‘Secure by Design’ Pledge: A Year of Progress in Cybersecurity
By Carl Windsor, Chief Information Security Officer at Fortinet Secure-by-design practices represent a fundamental shift in software development: secu...
Cloudflare global outage: It was an internal technical error. Let’s find out the cause.
On November 18, 2025, at 11:20 UTC , a significant portion of Cloudflare’s global infrastructure suddenly ceased to properly route Internet traffic,...
Cloudflare goes down in the magnificent cloud! Global incident is being resolved.
November 18, 2025 – After hours of widespread disruptions , the incident affecting Cloudflare’s global network finally appears to be nearing resol...
Cloudflare Down: Websites and Services to Go Down on November 18, 2025
The morning of November 18, 2025, will be remembered as one of the most anomalous and widespread outages on the Cloudflare network in recent months. T...
IBM AIX: Two critical bugs allow execution of arbitrary commands (Score 10 and 9.6)
Two serious vulnerabilities in IBM’s AIX operating system could allow remote attackers to execute arbitrary commands on affected systems, prompting ...
Twitter Hack: $4.1 Million Seized from 26-Year-Old Joseph James O’Connor
The story of the global Twitter hack in the summer of 2020 has had a sequel: British prosecutors have obtained the seizure of cryptocurrency mined by ...
Shakerati Anonimi: Nicoletta’s experience and the credit card thriller
The room is the same: dim lights, chairs in a circle, thermoses of herbal teas now cold from all the talking and venting. We are Shakerati Anonimi , a...
Apple ordered to pay $634 million to Masimo for patent infringement
Masimo, an American company that develops medical monitoring technologies, has won another round of litigation with Apple . A federal jury awarded it ...
Microsoft Azure blocks a 15.72 terabit per second DDoS attack
A massive DDoS attack was neutralized by Microsoft Azure on October 24. A single endpoint located in Australia was targeted by the attack, which reach...
Spy Apps: How Spyware Works and Why It’s a Privacy Risk
Spyware (also known as spy apps) represent one of the most insidious and dangerous threats of the digital age. These are malicious programs designed t...
Asus releases emergency firmware update for vulnerable DSL routers.
Asus has released an emergency firmware update for several DSL router models. The patch addresses a critical vulnerability that allows attackers to ta...
Nuclear power entirely in the hands of AI! And what if there’s an accident?
In the technological field, the idea that the future development of generating systems depends inexorably on the expansion of nuclear capacity is taki...
Veeam Analysis: Ransomware Payments Decline, But Data Resilience Remains Critical for EMEA Enterprises
Beyond backup: Businesses need cyber resilience, data portability, secure cloud storage, and hybrid cloud protection . Data from the Veeam Ransomware ...
The History of GPS: The History of Satellite Navigation
It’s amazing how far we’ve come with satellite navigation in the last 40 years. GPS (Global Positioning System) is one of the most useful things t...
Tor Browser 15.0.1: Critical Vulnerability Fixes and Improvements
The Tor Project has released Tor Browser 15.0.1 , fixing critical security vulnerabilities inherited from Firefox 140.5.0esr. This maintenance release...