Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
320x100 Itcentric
Crowdstriker 970×120

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Redazione RHC
(12314 articoli, 10918 italiano, 1396 inglese)12314 articoli
10918 italiano, 1396 inglese

The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.

Ultimi articoli di Redazione RHC

Google, Amazon, and Meta and Their “Submarine War”
Global traffic, as RHC readers know, travels mostly under the sea. According to TeleGeography, a telecommunications institute, there are more than 530...
TIM and Poste Italiane launch the sovereign cloud: the birth of the Italian-made AI and innovation hub
It was time for Italy to wait for a clear signal in the area of digital sovereignty. The union of two giants like TIM and Poste Italiane represents mo...
An “autonomous” spy campaign was orchestrated by artificial intelligence
An analysis conducted in recent months had highlighted how the evolution of artificial intelligence systems was reaching a critical point for cybersec...
A 0-day exploit on FortiWeb WAF is actively exploited! And remove the Admin interfaces from the Internet
Attackers are actively exploiting a critical flaw in Fortinet’s FortiWeb web application protection (WAF) system, which could be used as a means to ...
VLC and its creator receive award for choosing freedom over millions of dollars
Whenever you come across an unknown media file or a strange link that won’t open with any standard application, there’s always one program that co...
What is Misevolution: The Autonomous Evolution of AI Agents, and It’s Not Always Good
Shanghai, November 11, 2025 – A new study conducted by the Shanghai Artificial Intelligence Laboratory , in collaboration with Shanghai Jiao Tong Un...
A 0Day bug for a WordPress plugin sold for 6000 euros in the underground
On one of Russia’s most popular forums for buying and selling vulnerabilities and attack tools, the thread appeared as a standard commercial ad, but...
Can a cyber attack reduce a country’s GDP? In the UK, it seems so!
The British economy contracted further in September, largely due to the cyber attack on car manufacturer Jaguar Land Rover (JLR) and its forced closur...
Triofox Antivirus Exploited to Install Remote Access Components
Google researchers warn that hackers are exploiting a critical vulnerability in Gladinet Triofox to remotely execute code with SYSTEM privileges, bypa...
BazarLoader: The precursor malware used by RaaS gangs
BazarLoader (sometimes referred to as BazaLoader ) is a ” precursor malware ” that provides initial backdoor access to an infected Windows host. O...
Emotet: The horse returns to a gallop more dangerous than ever
Emotet is a malware of the Trojan Horse category, which began its first spread in 2014 which brought it to the podium among the main cyber threats of ...
Two 0-day attacks, one attack: the perfect strike against Citrix and Cisco. Amazon’s discovery
Amazon ha segnalato un complesso attacco informatico in cui gli aggressori hanno sfruttato simultaneamente due vulnerabilità zero-day, presenti nei p...
The Queen of Cryptocurrency Has Been Captured! She Stole $7 Billion in Bitcoin
A London court has sentenced 47-year-old Chinese woman Zhimin Qian , also known as Yadi Zhang, to 11 years and eight months in prison for laundering b...
Cyber Sabotage Alert: Volt Typhoon Prepares for Destructive Activities
The Australian Security Intelligence Organisation (ASIO) has raised the alarm about the readiness of authoritarian states to go beyond cyber espionage...
Microsoft fixes 63 vulnerabilities, including an actively exploited zero-day
On November’s Patch Tuesday, Microsoft fixed 63 vulnerabilities , including a critical zero-day vulnerability that had already been exploited in att...