Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Fortinet 320x100px
Banner Ransomfeed 970x120 1

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Redazione RHC
(12314 articoli, 10918 italiano, 1396 inglese)12314 articoli
10918 italiano, 1396 inglese

The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.

Ultimi articoli di Redazione RHC

Tesla wants to give Musk 1,000 billion dollars for a science fiction plan. More than the GDP of Switzerland!
Numerous accolades are pouring in for Elon Musk, who continues to deftly lead his empire’s multiple businesses, including Tesla, SpaceX, xAI, and St...
Russian Sandworm hackers target Ukrainian grain industry with wiper malware
Russian Sandworm hackers use wiper malware against the Ukrainian grain industry. Ukraine’s grain industry has become the latest target of the infamo...
Highly advanced, adaptive malware uses AI to confuse security defenses
Based on a recent analysis by the Google Threat Intelligence Group (GTIG), a shift has been identified among threat actors over the past year. Continu...
An AI extension for VS Code turns your PC into a digital hostage
Secure Annex researchers found a malicious extension in the Visual Studio Code Marketplace extension catalog for VS Code that features basic ransomwar...
The Louvre’s security myth crumbles! Between audits, ridiculous passwords, and outdated cameras.
The recent theft at the Louvre Museum, located in the heart of Paris, has shocked not only the art world but also the cybersecurity world. On the nigh...
Double-dealing: employees of a company that resolved ransomware attacks were launching them themselves
Three former DigitalMint employees, who investigated ransomware incidents and negotiated with ransomware groups, are accused of hacking into the netwo...
2 critical bugs detected on Cisco Unified Contact Center Express (CCX)
Cisco has published two new critical vulnerabilities affecting Cisco Unified Contact Center Express (CCX) , the platform used by thousands of companie...
China is using artificial intelligence to improve mass surveillance
In Beijing, in a banquet hall of a luxury hotel, police officers from across the country attended a conference dedicated to the application of artific...
Microsoft apologizes to 3 million Australian users for unfair business practices
Microsoft has apologised to nearly 3 million Australian users and offered them refunds for subscriptions to its new, more expensive Microsoft 365 offi...
Cisco Addresses Critical Vulnerabilities in ASA and Unified Contact Center Express
Cisco recently announced the discovery of a new type of cyberattack aimed at compromising devices running Cisco Secure Firewall Adaptive Security Appl...
Rust Rebels! Fund Launched to Pay Open Source Maintainers
The Rust Foundation has announced the launch of the Maintainers Fund, a new program designed to support developers responsible for the stability and d...
12.5 million HD movies per second! Amazon’s undersea cable will connect the US to Ireland.
In a few years, Ireland and the United States will be connected by an undersea communications cable designed to help Amazon improve its AWS services. ...
SMTP Posts Actively Exploited: 400,000 WordPress Sites at Risk
Attackers are targeting WordPress websites by exploiting a critical vulnerability in the Post SMTP plugin, which has over 400,000 installations. Hacke...
Cyberattacks against public applications are increasing. Cisco’s report
Milan, November 4, 2025 – Cyberattacks that exploit publicly accessible applications, such as websites or corporate portals, to gain access to organ...
Epic vs. Google: Historic Agreement for App Developers
Just when it seemed like Epic’s case against Google was on the verge of a final victory for the developer —following the potential dismissal of Go...