Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Banner Ancharia Mobile 1
UtiliaCS 970x120

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Nessun autore trovato con i filtri selezionati.

Ultimi articoli di Redazione RHC

Phishing Campaigns Exploit File Sharing Services
Researchers at Check Point, a pioneer and global leader in cybersecurity solutions, have discovered a phishing campaign in which attackers pose as fil...
RansomHouse Ransomware Upgraded: Enhanced Encryption Threat
The group behind RansomHouse, one of the most notorious ransomware distribution services, has strengthened the technical capabilities of its attacks. ...
Cyber Attacks on the Rise: Wiper Malware and Data Destruction in 2025
According to BI.ZONE, by 2025, attackers will increasingly opt for total destruction of corporate infrastructure rather than encryption . This refers ...
San Francisco Power Outage Exposes Waymo Self-Driving Car Vulnerabilities
A massive power outage in San Francisco has disrupted self-driving vehicle traffic. Waymo self-driving vehicles have been spotted on city streets, sto...
Microsoft Shifts Activation Process: What It Means for Air-Gapped Systems
In the past, many users and system administrators have relied on Microsoft’s telephone activation service to manage installations in specific contex...
PuTTY Under Siege: Hackers Exploit Popular Client for SSH Attacks
Hackers love to exploit the most innocuous tools to infiltrate their targets’ networks, and we all know this. And in this case, they’re targeting ...
OAuth Device Code Phishing: New Attack Vector for Account Takeover
Cybercriminals are getting smarter and have found a new way to exploit corporate security protocols. It seems incredible, but it’s true: they’re u...
DIG AI: The Dark Web’s New AI Tool for Cybercrime
A new AI tool has appeared on the dark web and quickly attracted the attention of security experts, and not for the best of reasons. This is an artifi...
TikTok Accused of Illegally Tracking Users’ Data Across Apps
The popular video app TikTok has found itself at the center of a new scandal over violations of European data protection regulations. The service has ...
Naftali Bennett Telegram Account Hacked in Israel Politics
Former Israeli Prime Minister Naftali Bennett has admitted that his Telegram account was hacked, although his device was not compromised. He made the ...
Cisco Secure Email Gateway Vulnerability Exploited: Act Now
A critical zero-day flaw in Cisco Secure Email Gateway and Cisco Secure Email and Web Manager devices is causing concern among security researchers. W...
Airbus Eyes Sovereign Cloud to Mitigate US Data Risks
In recent months, a question has been emerging with increasing insistence on European corporate boards: is the US cloud really safe for all companies?...
North Korean Hackers Steal $2 Billion in Crypto, Targeting DeFi Sector
In 2025, North Korean hackers stole a record $2 billion in cryptocurrency , 51% more than the previous year. However, the number of attacks has decrea...
Kimwolf Botnet: The Rising Threat of DDoS Attacks on IoT Devices
A new and formidable enemy has emerged in the cyber threat landscape: Kimwolf, a fearsome DDoS botnet, is having a devastating impact on devices world...
54 Arrested in $Multi-Million ATM Jackpotting Scheme Linked to Tren de Aragua
A federal grand jury in the District of Nebraska has indicted a total of 54 people accused of participating in a vast criminal operation that used mal...
The Birth of World Wide Web: How Tim Berners-Lee Created the First Website
There you have it! On December 20, 1990, something epochal happened at CERN in Geneva. Tim Berners-Lee , a British computer genius, created the first ...
WatchGuard Firewall Zero-Day Vulnerability CVE-2025-14733 Exploited
A critical zero-day vulnerability, identified as CVE-2025-14733, has left network administrators on their knees, forcing them into a race against time...
Linux Kernel CVE-2025-68260 Vulnerability Fixed: Rust Code at Risk
The world of technology is a veritable battlefield, where coding geniuses challenge malicious attackers every day with exploits and security patches. ...
Google and Apple Embrace Interoperability with Android iOS Data Transfer
Users looking to switch from an iOS to Android ecosystem or vice versa often face less of a challenge than easily transferring photos, conversation lo...
Bypassing AI Safety: EchoGram Exposes Vulnerabilities in LLM Defenses
Large language models are typically released with security constraints : separate AIs from the main LLM ensure that malicious suggestions aren’t pas...