Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Redhotcyber Banner Sito 320x100px Uscita 101125
970x120

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Redazione RHC
(12314 articoli, 10918 italiano, 1396 inglese)12314 articoli
10918 italiano, 1396 inglese

The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.

Ultimi articoli di Redazione RHC

Italy and Adult Sites: The Country Where Entry Is Forbidden… But If You Click Yes, It’s Okay
From November 12, 2025, AGCOM reported that in line with art. 13-bis of the Caivano decree (dl123/2023) , 47 adult websites accessible from Italy woul...
Slammer, the first worm to use a bug that hasn’t been fixed for six months.
Many years have passed since the SQL Slammer worm spread uncontrollably on January 25, 2003. It was one of the fastest-spreading malware in history , ...
The Story of the First Keylogger: How Hidden Keyboard Control Came to Be
We all know Bruce Schneier , a renowned cryptography and computer security expert, member of the board of directors of the International Association f...
A Brief History of Malware: The Evolution of the Species from Its Origins to the Present Day
At first we talked about “viruses” , then “worms” appeared, followed by “macro viruses”. These were soon joined by other types of hostile ...
Discovering Sandworm: The Kremlin’s National State Group
As we know, there are different types of cybercriminals. There are ethical hackers and criminal hackers. Within criminal hackers, there are a multitud...
Discovering DarkSide: Techniques, Tactics, and Affiliations
Researchers across the cyber community have been exchanging a great deal of information lately about the DarkSide ransomware cyber gang, the emerging ...
Remember NVIDIA DGX Spark? Here comes the GMKtec EVO-X2, at half the price.
Chinese manufacturer GMKtec has presented its new EVO-X2 mini PC , equipped with a Ryzen AI Max+ 395 processor , claiming performance comparable – a...
Did the US steal 127,000 Bitcoins? China accuses Washington of a massive hack.
We’re talking about 11 billion euros. A staggering figure! China’s National Computer Virus Emergency Response Center (CVERC) said that a state-run...
The Most Famous Hackers: The Story of Kevin Mitnick, AKA the Condor
Kevin Mitnick (code name Condor) is perhaps the most famous hacker of all time. He is an American hacker, IT security consultant, ethical hacking expe...
Synology fixes a zero-day bug in BeeStation OS. Researchers receive $40,000.
Synology has patched a zero-day vulnerability in its BeeStation devices, demonstrated during the recent Pwn2Own competition. The bug, identified as CV...
Midnight Ransomware: A free decryptor has been released thanks to a bug in the code.
Researchers have discovered a vulnerability in the new Midnight ransomware , based on the old Babuk source code. The malware is marketed as an “adva...
NetScaler ADC and Gateway Vulnerable: Urgent Updates to Prevent XSS Attacks
NetScaler and Citrix – On November 11, 2025, released security bulletin CTX695486 regarding the CVE-2025-12101 vulnerability, which affects the NetS...
LLM: Wikipedia Parasites: The Importance of Humanity in the Age of Artificial Intelligence
In the age of rapid advances in artificial intelligence, Wikipedia’s importance as a reliable source of knowledge has become particularly significan...
OWASP Top 10 2025: New Web Application Threats, Supply Chain Top Three
After four years, OWASP has updated its TOP 10 list of the most dangerous web application risks, adding two new categories and revising the ranking st...
Attack Techniques: What is a Command and Control (C2) Server?
Among the many strategies used by attackers, one of the most insidious is represented by Command and Control (C2) Servers. We often discuss them on th...