Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Fortinet 320x100px
Banner Ransomfeed 970x120 1

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Redazione RHC
(12311 articoli, 10916 italiano, 1395 inglese)12311 articoli
10916 italiano, 1395 inglese

The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.

Ultimi articoli di Redazione RHC

Asus releases emergency firmware update for vulnerable DSL routers.
Asus has released an emergency firmware update for several DSL router models. The patch addresses a critical vulnerability that allows attackers to ta...
Nuclear power entirely in the hands of AI! And what if there’s an accident?
In the technological field, the idea that the future development of generating systems depends inexorably on the expansion of nuclear capacity is taki...
Veeam Analysis: Ransomware Payments Decline, But Data Resilience Remains Critical for EMEA Enterprises
Beyond backup: Businesses need cyber resilience, data portability, secure cloud storage, and hybrid cloud protection . Data from the Veeam Ransomware ...
The History of GPS: The History of Satellite Navigation
It’s amazing how far we’ve come with satellite navigation in the last 40 years. GPS (Global Positioning System) is one of the most useful things t...
Tor Browser 15.0.1: Critical Vulnerability Fixes and Improvements
The Tor Project has released Tor Browser 15.0.1 , fixing critical security vulnerabilities inherited from Firefox 140.5.0esr. This maintenance release...
16 Years of Go: An Innovative and Scalable Programming Language
In November 2025, the Go programming language turned 16 years old. It was released publicly on November 10, 2009 , as a Google experiment to create a ...
Google is ready to launch Gemini 3.0: will it really be the turning point in the AI race?
Google is getting closer to the official unveiling of Gemini 3.0 , the new artificial intelligence model destined to represent one of the most signifi...
The Louvre was deceived by two Belgian pranksters! They hung their painting next to the Mona Lisa.
Louvre security is under fire again after pranksters managed to trick guards and hang their painting in the same room as the Mona Lisa. Belgian duo Ne...
Are Black Hackers Demanding Ransom? Checkout.com Responds: We Fund Those Hunting You
Payment service Checkout.com was the victim of an extortion attempt: the ShinyHunters group claimed to have accessed company data and demanded a ranso...
Trump, Hong Kong, and the Global Rush to Regulate Cryptocurrencies
Throughout 2024, there were several signs of a shift in the relationship between institutions and cryptocurrencies. On March 6, President Donald Trump...
Sam Altman and her husband Oliver and the dream of genetically modified children
The pursuit of immortality is a pervasive obsession in Silicon Valley. Likewise, the idea of perfecting children through genetic modification is anoth...
The stress of social network algorithms causes burnout in creators
A new research project has shown that the online content industry, which has offered people thousands of new ways to earn money, is also placing signi...
Virtual Private Network (VPN): What It Is, How It Works, and Why
A VPN , short for Virtual Private Network, is a system that allows you to establish a secure and private connection over a public network, such as the...
Rare Earths: What They Are and Why They Matter More Than Oil in Today’s World
We often hear about the so-called “Rare Earths”. This is a set of seventeen metallic elements. These include the fifteen lanthanides on the period...
A journey into the world of OT/ICS: What are SCADA servers?
The world of OT (Operational Technology) and ICS (Industrial Control Systems) is closely related to SCADA (Supervisory Control and Data Acquisition) s...