Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Fortinet 320x100px
UtiliaCS 970x120

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Redazione RHC
(12314 articoli, 10918 italiano, 1396 inglese)12314 articoli
10918 italiano, 1396 inglese

The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.

Ultimi articoli di Redazione RHC

ChatGPT to Introduce Targeted Ads, Changing Monetization Strategy
Until now, ChatGPT has been ad-free: no banners, no hidden promotions. Even the paid versions worked without pushy offers. But that could change soon....
GitLab Security Updates Fix High-Severity Vulnerabilities CVE-2024-9183
GitLab has released critical security updates for its Community Edition (CE) and Enterprise Edition (EE) to address several high-severity vulnerabilit...
Apache SkyWalking Vulnerability Exposes Users to XSS Attacks
A vulnerability was recently discovered in Apache SkyWalking , a popular application performance monitoring tool, that attackers could exploit to exec...
Bloody Wolf Attacks Central Asia with NetSupport RAT via Java Exploits
Group-IB specialists have recorded new attacks by the Bloody Wolf hacker group, which has been targeting Kyrgyzstan since June 2025 and has expanded i...
WhatsApp Blocked in Russia: Messaging App Faces Crackdown
The Russian Federation’s Roskomnadzor has announced that it continues to impose systematic restrictions on the messaging app WhatsApp due to violati...
CEO Scam: How to Protect Your Company from Business Email Compromise
This morning, Paragon Sec was contacted by an Italian company that had been the victim of a new fraud attempt known as the CEO Scam . The accounting d...
Shai-Hulud Worm Spreads Beyond npm, Attacks Maven
The Shai-Hulud worm has spread beyond the npm ecosystem and was discovered in Maven . Socket specialists noticed an infected package on Maven Central ...
11.7% of jobs could be replaced by artificial intelligence
Artificial intelligence is currently capable of performing work equivalent to 11.7% of US employment . And not just in theory: in terms of monetary va...
The market for “controlling” people is taking off on the Dark Web.
BI.ZONE experts analyzed over 3,500 advertisements on darknet platforms offering dossiers on specific individuals, known as “probiv” (finding). On...
Does Windows Suck? A Video by Dave Plummer, the Microsoft Engineer Who Created Task Manager
Dave Plummer, a highly regarded former senior engineer at Microsoft who led the development of several key Windows components, including Task Manager,...
China surpasses US in open-source AI models
China surpasses the United States in the global market for open-source artificial intelligence (AI) models. According to a November 26 Financial Times...
ENISA takes on the role of Root in the European Cybersecurity Initiative (CVE).
The European Union Agency for Cybersecurity (ENISA) has taken on the role of Root within the Common Vulnerabilities and Exposures (CVE) programme, bec...
Supply Chain Attack on OpenAI: Analytics Provider Mixpanel Compromised
OpenAI has confirmed a security incident at Mixpanel, a third-party analytics provider used for its APIs. According to the investigation, the cause of...
Be careful when using SSDs! Without power, you risk data loss
XDA Developers reminds us that using solid-state drives for long-term storage is risky. If SSDs are left without power for years, data can become corr...
Quantum Computing vs. Artificial Intelligence: Which Will Really Change the Future?
Quantum mechanics remains a complex and mysterious field, both difficult to explain and difficult to understand. This branch of physics studies the un...