Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Enterprise BusinessLog 320x200 1
Redhotcyber Banner Sito 970x120px Uscita 101125

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Redazione RHC
(12314 articoli, 10918 italiano, 1396 inglese)12314 articoli
10918 italiano, 1396 inglese

The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.

Ultimi articoli di Redazione RHC

Russian Interior Ministry officials arrested the creators of the Medusa malware
The Russian programming team behind the Medusa malware has been arrested by officials from the Russian Interior Ministry, with the support of police i...
Hikvision Exploiter: The open-source tool for attacking IP cameras
A new open-source tool, known as HikvisionExploiter, was recently updated. This tool is designed to automate cyberattacks against vulnerable Hikvision...
100 Infostealer packages uploaded to NPM using AI hallucinations
Since August 2024, the PhantomRaven campaign has uploaded 126 malicious packages to npm, which have been downloaded a total of over 86,000 times . The...
Atroposia: The MaaS platform that provides a Trojan with a vulnerability scanner
Varonis researchers have discovered the Atroposia MaaS (malware-as-a-service) platform. For $200 a month, its customers receive a remote access Trojan...
0day as weapons: sold 8 US defense 0day exploits to Moscow
Peter Williams, a former employee of the defense contractor, pleaded guilty in US federal court to two counts of theft of trade secrets, admitting to ...
Critical vulnerability in Blink: a website can block all Chromium-based browsers
Researcher José Pino has presented a proof-of-concept vulnerability in the Blink rendering engine used in Chromium -based browsers, demonstrating how...
Trump-Xi Summit: A Truce That Doesn’t Benefit Europe
After years of tensions, tariffs, mutual accusations, and trade wars that have shattered the global balance of power, the long-awaited meeting between...
Cloud yes or Cloud no: When the Digital Sky Darkens
The outage of Microsoft’s cloud services, which occurred just hours before the release of its quarterly results, is just the latest in a long series...
Taiwan: Up to 7 years in prison for those who damage undersea cables
Taipei, October 30, 2025 – Taiwan’s Legislative Yuan Economic Commission has approved the first reading of a series of amendments to the so-called...
95% of companies believe they’re ready for ransomware. But only 15% actually are!
Companies’ widespread confidence in their cyber resilience is facing a new wave of threats, this time from artificial intelligence. According to the...
US builds largest AI supercomputer in history
The U.S. Department of Energy (DOE) has entered into a strategic collaboration with Nvidia and Oracle to build seven next-generation AI-powered superc...
Microsoft 365 goes down: DNS anomaly paralyzes services worldwide
A DNS service outage was detected by Microsoft on October 29, 2025, impacting access to critical services such as Microsoft Azure and Microsoft 365. A...
Tor Browser Says No to Artificial Intelligence! Security Comes First
Interestingly, while major companies like Microsoft and Google are actively adding AI features to their browsers, the Tor development team has chosen ...
Nvidia launches NVQLink for quantum computing
Nvidia hasn’t developed its own quantum computer, but CEO Jensen Huang is betting the company will play a key role in the technology’s future. In ...
183 million Gmail accounts hacked! But it was just a hoax
For the second time in recent months, Google has been forced to deny reports of a massive Gmail data breach . The news was sparked by reports of a “...