Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
320x100 Itcentric
2nd Edition GlitchZone RHC 970x120 2

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Redazione RHC
(12314 articoli, 10918 italiano, 1396 inglese)12314 articoli
10918 italiano, 1396 inglese

The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.

Ultimi articoli di Redazione RHC

The secret behind Space Invaders’ speed? A technical limitation of the hardware
In 1978, Taito’s Space Invaders captivated audiences with its seemingly ingenious gameplay: the more aliens you shot down, the faster the remaining ...
$2.8 billion in cryptocurrency stolen! Here’s how North Korea circumvents UN sanctions.
Member countries of the international monitoring group MSMT have concluded that North Korea is increasing its use of cybercrime and the remote work of...
CoPhish is coming! Microsoft Copilot Studio used to steal accounts
Attackers are using an advanced phishing technique, known as CoPhish, that leverages Microsoft Copilot Studio to trick users into granting unauthorize...
Anatomy of a Data Theft: Technical Analysis of the “Formbook” Infostealer
In the cyber threat landscape, few malware programs are as persistent and widespread as Formbook . What began as a simple keylogger and form grabber h...
OpenAI is working on a neural network for music creation
According to The Information, OpenAI is actively working on its own neural network for music creation , which will compete with projects like Suno and...
Oracle VirtualBox Vulnerability: Risk of Virtual Machine Escape
BI.ZONE specialists have identified two vulnerabilities (CVE-2025-62592 and CVE-2025-61760) in Oracle VirtualBox. When combined, they allowed an attac...
YouTube Ghost Network: The phantom network that infected millions of users
Google specialists removed over 3,000 videos from YouTube that spread hidden information disguised as hacked software and video game cheats. Check Poi...
While Pope Francis is alive and continues his ministry, disinformation is rampant.
A survey conducted by the European Broadcasting Union (EBU), with support from the BBC, has highlighted that the most popular chatbots tend to distort...
New submarine cables in the Black Sea: Europe seeks digital independence from Russia
Eastern Europe is preparing for a new phase in telecommunications security. An ambitious submarine cable project, called Kardesa , will connect Bulgar...
BreachForums Resurrects After Yet Another FBI Shutdown
We’ve often quoted this phrase: “Fighting cybercrime is like pulling weeds: if you don’t completely eradicate them, they’ll grow back, much mo...
Gemini 3.0 Pro: Google prepares for the generational leap and aims to surpass GPT-5 and Claude 4.5
Over the past few days, some users have received a notification saying that their Gemini Advanced devices have been “upgraded from the previous gene...
13,000 times faster than a supercomputer. Google presents Willow, the fastest quantum chip on specific algorithms
Google’s quantum AI team announced a major breakthrough in quantum computing with the unveiling of its new Willow processor, a superconducting chip ...
Neolix raises $600 million for autonomous driving in urban logistics
Chinese startup Neolix , specializing in Level 4 autonomous vehicles for urban deliveries, announced on October 23 that it has closed a Series D round...
Supercomputing power in a refrigerator: the BIE-1 revolution
On October 24, the world’s first human-inspired intelligent computing system, the “BI Explorer BIE-1,” was officially unveiled at the Guangdong-...
Critical RCE exploit in Microsoft WSUS actively exploited. CISA warns: imminent risk
A global alert has been issued by the United States Cybersecurity and Infrastructure Security Agency (CISA) regarding the active exploitation of a cri...