Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
UtiliaCS 320x100
TM RedHotCyber 970x120 042543

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Redazione RHC
(12314 articoli, 10918 italiano, 1396 inglese)12314 articoli
10918 italiano, 1396 inglese

The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.

Ultimi articoli di Redazione RHC

Let’s find out what cyber insurance is. It insures your online business, but not only that.
The digital world is constantly evolving, and with the growth of online activity, protecting your business from potential cyber threats has become inc...
Let’s find out what Business Impact Analysis (BIA) is
Business Impact Analysis (BIA) is a fundamental tool for ensuring business continuity. BIA helps organizations identify activities critical to their o...
What is risk analysis in ICT Risk Management?
Risk analysis is an important process in the context of ICT Risk Management as it allows us to evaluate the effectiveness of the technical countermeas...
What is Web Scraping? Let’s Understand It Better
We have often talked about huge user databases being sold on underground forums and said that this was web scraping. In April 2021, Facebook lost 533 ...
What is a zero-day and the risk of targeted cyber attacks
Zero-day vulnerabilities are one of the greatest cybersecurity risks for organizations. These are unknown and unpatched vulnerabilities that attackers...
The world of software vulnerabilities: how they’re exploited, who creates them, and how to protect yourself.
Software vulnerabilities pose a threat to cybersecurity because hackers can exploit them to gain access to computer systems. A software vulnerability ...
Who invented the World Wide Web? The story of Timothy Berners-Lee, the genius behind the web
We all use the internet every day, at all hours, our smartphone has become an active prosthesis of our body, but have we ever wondered who invented th...
Marketing is nothing! VPNs sell themselves every time a government blocks adult sites
Hundreds of millions of smartphone users have faced blocking of pornographic websites and mandatory age verification. The UK has introduced mandatory ...
The Windows 98 Blue Screen of Death That Changed Microsoft’s Plans
It was April 20, 1998. Microsoft was so embarrassed by the iconic Windows 98 blue screen of death on stage that it decided to change plans for buildin...
Roblox: The Platform That Puts Children’s Safety at Risk
With over 100 million daily active users , Roblox attracts countless children around the world. Nearly half of its audience is under 13, and in Austra...
The Origins of UNIX: The Original Bell Labs Tape Resurfaces from Utah
A rare find from the early days of Unix may take researchers back to the very origins of the operating system. A magnetic tape labeled ” UNIX Origin...
21 Years of Firefox: A History of Innovation and Independence
November 9th marked the 21st anniversary of Firefox 1.0. In 2004, it was the first stable release of Mozilla’s new browser, which quickly positioned...
Hyundai subsidiary HAEA data breach: Sensitive information at risk
HAEA, a subsidiary of South Korean Hyundai Motor Group and headquartered in California, USA, provides customized IT solutions and services for the aut...
Malware is a ticking time bomb! The threat to Siemens S7 PLCs begins in 2027.
Researchers discovered several libraries in the public NuGet registry containing code that will be activated in 2027 and 2028. The infected packages t...
Vault7 with a Chinese twist: China’s secret global surveillance system exposed
Only the flag changes, but the result is always the same. In 2017, WikiLeaks published Vault7 , a leak that exposed the CIA’s arsenal: toolkits for ...