Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Banner Mobile
Banner Ancharia Desktop 1 1

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Redazione RHC
(12314 articoli, 10918 italiano, 1396 inglese)12314 articoli
10918 italiano, 1396 inglese

The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.

Ultimi articoli di Redazione RHC

Undersea Cables, the New Hybrid War: Jaroslav Nad’s Alarm
Taiwan is critically dependent on its undersea infrastructure, which is essential for communications and power supply . In recent years, however, ther...
Apache OpenOffice under ransomware attack, but the foundation disputes
The Apache OpenOffice project has come under scrutiny after the Akira ransomware group claimed to have carried out a cyberattack and stolen 23 gigabyt...
Microsoft warns: Security updates cause problems with BitLocker
Microsoft has issued an urgent warning to Windows operating system users regarding a potential issue that, starting with security updates distributed ...
A dangerous zero-day zero-click exploit threatens billions of Android devices
Google has issued an urgent advisory regarding a critical vulnerability in Android that allows attackers to execute arbitrary code on the device witho...
Is the era of paywalls over? Smart browsers circumvent them, and controlling them is very difficult
Danger for OneDrive users: Infected DLLs hide in shared files
Attackers are using an advanced technique involving sideloading DLLs via the Microsoft OneDrive application. This allows them to execute malicious cod...
ArXiv blocks articles generated by AI
arXiv, one of the most important repositories of scientific preprints , has revealed some disturbing facts following growing concerns in the scientifi...
CISA Warns! New Bugs in Gladinet, Control Web Panel, and WordPress Expose Systems
Two vulnerabilities related to Gladinet and Control Web Panel (CWP) have been added to the U.S. Cybersecurity and Infrastructure Security Agency (CISA...
New bugs in Teams open the door to data theft and social engineering
Cybersecurity experts have disclosed four vulnerabilities in Microsoft Teams that could have allowed attackers to conduct dangerous social engineering...
OpenAI releases Sora Mobile App on Android, available in multiple countries
OpenAI has released the Sora mobile app on Android devices. CNBC reported that OpenAI’s Sora app is now available for download through the Google Pl...
Drones at Brussels Airport and Military Bases: Security at Risk
On Tuesday evening, due to the presence of a drone in the airspace, air traffic controller Skeyes ordered the temporary suspension of flights departin...
Does Microsoft use macOS to create Windows wallpapers? Probably!
On October 29, Microsoft released a wallpaper to commemorate the eleventh anniversary of the Windows Insider program, and it is speculated that it was...
Louvre Theft: Windows 2000 and Windows XP on Networks, as Well as Simple Passwords
As we know, the thieves in the “theft of the century” entered through a second-floor window of the Louvre Museum, but the museum had other problem...
SesameOp: The Malware That Uses OpenAI Assistants for Command and Control
Microsoft has discovered a new malware, dubbed SesameOp , and published details of how it works . This backdoor was unusual: its creators used the Ope...
Chinese hackers target European diplomatic agencies (including Italy)
The China-linked hacker group UNC6384 ( also known as Mustang Panda ) is conducting a large-scale cyberespionage campaign targeting European diplomati...