Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
UtiliaCS 320x100
2nd Edition GlitchZone RHC 970x120 2

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Redazione RHC
(12311 articoli, 10916 italiano, 1395 inglese)12311 articoli
10916 italiano, 1395 inglese

The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.

Ultimi articoli di Redazione RHC

Quishing: What it is, how it works, and how to protect yourself
Quishing is an emerging form of cyberattack that combines traditional phishing with the use of QR codes , tools now familiar to many. The term ” qui...
Password Managers: A Complete Guide to Choosing and Using Them
Passwords: how important are they in our digital lives? How many times have we reported this on our pages? Most digital activities— from social medi...
Kraken Arrives: The New Ransomware That Assesses Your Environment to Inflict Maximum Damage
Cisco Talos researchers have detected an active wave of attacks using a new ransomware called Kraken. The group began operating in February 2025 and u...
North Korea reorganizes its intelligence with a new agency
North Korea has restructured its intelligence hierarchy, transforming the former Intelligence Agency into a structure with a much broader mandate. The...
Did they give you a digital photo frame? It’s more than just family memories.
Researchers have discovered several critical vulnerabilities in Uhale digital picture frames running Android , with some models even downloading and e...
What are PsyOps? Exploring mind manipulation in the digital age.
Psychological operations, commonly known as PsyOps, are a significant and often poorly understood element of military and security strategy . These op...
Understanding Firewalls: The First Line of Defense in Cybersecurity
In the world of cybersecurity, firewalls are the first line of defense against cyber threats and attacks. Every day, businesses and home users are exp...
Critical Vulnerability in FortiWeb: Fortinet and CISA Recommend Urgent Updates
Fortinet has confirmed the discovery of a critical relative path vulnerability (CWE-23) in FortiWeb devices, identified as CVE-2025-64446 and register...
China’s New Era of Robots: Shenzhen at the Center of the Technological Revolution
The 15th Chinese National Games opened with a spectacle that combined sport and technology. Among the highlights were robots capable of playing ancien...
IndonesianFoods: The Worm That’s Wreaking Havoc on npm and Created 100,000 Packages
A self-propagating worm, named IndonesianFoods , has been discovered in npm . It generates new packets every seven seconds. According to Sonatype, the...
Two-Factor Authentication and MFA: Protect Your Accounts in 3 Easy Steps!
Two-factor authentication (2FA) , or more commonly, Multi-Factor Authentication (MFA) , is an effective solution for protecting our online accounts. W...
The Wayback Machine “of souls” is coming soon. And so are the controversies
Many of us grew up with Hiroshi Shiba, from Jeeg the steel robot who talked to his late father, Professor Senjiro Shiba, a scientist and archaeologist...
The AI market is in crisis: NVIDIA and other tech giants are declining.
Artificial intelligence has been the biggest trend in recent years, as the stock prices of AI-related tech giants have skyrocketed. NVIDIA has surpass...
A bug in ImunifyAV antivirus leads to RCE. 56 million sites at risk.
A vulnerability has been discovered in the Linux hosting ecosystem : the ImunifyAV malware scanner has been found to be vulnerable to remote code exec...
Google, Amazon, and Meta and Their “Submarine War”
Global traffic, as RHC readers know, travels mostly under the sea. According to TeleGeography, a telecommunications institute, there are more than 530...