Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Banner Ancharia Mobile 1
Enterprise BusinessLog 970x120 1

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Redazione RHC
(12311 articoli, 10916 italiano, 1395 inglese)12311 articoli
10916 italiano, 1395 inglese

The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.

Ultimi articoli di Redazione RHC

CrowdStrike Insider Fired for Providing Sensitive Data to Criminal Hackers
In recent months, the insider problem has become increasingly important for large companies , and one recent episode involved CrowdStrike. The cyberse...
Sysmon will finally be integrated into Windows 11 and Windows Server 2025 in 2026
Microsoft has announced that it will integrate the popular Sysmon tool directly into Windows 11 and Windows Server 2025 in 2026. The announcement was ...
Sneaky2FA: The phishing scam that steals credentials with browser-in-the-browser attacks
Push Security specialists have noticed that the Sneaky2FA phishing platform now supports browser-in-the-browser attacks, which allow the creation of f...
TamperedChef: Malware via Fake App Installers
The large-scale TamperedChef campaign is once again attracting the attention of specialists, as attackers continue to distribute malware via fake inst...
Whoever took down Cloudflare during the outage put their infrastructure at risk
A major outage in Cloudflare’s infrastructure has unexpectedly tested the robustness of the cloud and its security systems for many businesses. On N...
Critical Vulnerability in Azure Bastion Scores 10! When RDP and SSH in the Cloud Are Checkmated
An authentication bypass vulnerability has been discovered in Azure Bastion , Microsoft’s managed service that enables secure RDP and SSH connection...
Risk averted for millions of Microsoft users! The critical vulnerability in Microsoft SharePoint 9.8
Microsoft has disclosed a critical vulnerability in SharePoint Online (discovered by RHC through our ongoing monitoring of critical CVEs on our portal...
Sturnus, the banking Trojan that intercepts WhatsApp, Telegram, and Signal messages
ThreatFabric specialists have discovered a new banking Trojan, Sturnus . The malware is capable of intercepting messages from end-to-end encrypted mes...
Disloyal Employees: Fired, Returns to Work, and Resets 2,500 Passwords Without the Company’s Knowledge
An employee has pleaded guilty to hacking into his former employer’s network and causing nearly $1 million in damages after being fired. According t...
Critical vulnerability in the WordPress plugin W3 Total Cache. 430,000 sites at risk!
A critical vulnerability, CVE-2025-9501, has been discovered in the popular WordPress plugin W3 Total Cache . This vulnerability allows the execution ...
Hundreds of robots on the march: China presents the new generation of humanoids
Shenzhen -based UBTECH Robotics has publicly demonstrated its new wave of humanoid robots, delivering several hundred of them in a single shipment. Th...
Veeam launches Data Platform v13, redefining the standard for cyber resilience and advanced data protection.
With new capabilities to stay ahead of threats and accelerate recovery with next-generation security, forensic insights and intelligent automation, Ve...
Happy birthday, Windows! 40 years of operating system history and still going strong.
Exactly 40 years ago, on November 20, 1985, Microsoft released Windows 1.0 , the first version of Windows, which attempted to transform the then-perso...
Huawei unveils HarmonyOS and the new HM740 laptop. Is Microsoft Office at risk?
On November 19, Huawei presented the latest developments in its HarmonyOS line for the office sector during a technical meeting with institutional par...
Meta and Google suspend construction of two undersea cables due to instability in the Red Sea
Meta and Google have been forced to postpone several major undersea internet cable projects, including 2Africa and Blue-Raman , in the Red Sea corrido...