Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
320x100 Itcentric
UtiliaCS 970x120

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Redazione RHC
(12314 articoli, 10918 italiano, 1396 inglese)12314 articoli
10918 italiano, 1396 inglese

The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.

Ultimi articoli di Redazione RHC

Google DeepMind launches Gemini Robotics-ER1.5 for advanced robotics
On September 25, 2025, Google DeepMind released Gemini Robotics-ER 1.5, a model designed for use in robotics. This is the first version of the reasoni...
New cyber attack campaign by the BO Team group
In early September 2025, Kaspersky Lab experts discovered a new campaign from the BO Team group, targeting Russian organizations across various sector...
AVKiller + HeartCrypt: The Combo That Opens the Door to Ransomware
A tool has appeared on the cybercriminal market that has quickly become a mass-produced weapon for dozens of groups. It’s HeartCrypt , a malware pac...
China and Artificial Intelligence: A New Era of Human-Machine Integration Begins
In August 2025 , China’s State Council released the “Opinions on Deepening the Implementation of the ‘Artificial Intelligence Plus’ Action Pla...
No flesh, no bones, just code! Channel 4’s first AI presenter arrives.
On Monday 20 October, Channel 4 broadcast a full-length documentary hosted by a creative TV presenter powered entirely by artificial intelligence. ”...
DC Comics takes a stand: “No generative AI”
DC Comics has definitively stated its position on generative AI: no machine involvement in the storytelling or illustrations . The announcement was ma...
$792,750 in one day! 56 zerodays detected at Pwn2Own Ireland 2025
On the second day of the Pwn2Own Ireland 2025 competition, participants achieved impressive success, discovering 56 new zero-day vulnerabilities and e...
A “hacked” water system: hacktivism becomes digital propaganda
In September, Forescout specialists detected a targeted attack on their honeypot server, which mimicked the control system of a water treatment plant....
Hackers can access Microsoft Teams chats and emails using access tokens
A recent discovery has revealed that hackers can exploit a flaw in Microsoft Teams on Windows to obtain encrypted authentication tokens , which grant ...
FIA website hacked: personal data of Max Verstappen and over 7,000 drivers exposed
Security researchers have discovered vulnerabilities in an FIA website that contained sensitive personal information and documents relating to drivers...
Microsoft Edge protects Internet Explorer mode from attacks
The Microsoft Edge security team made significant changes to Internet Explorer mode after receiving confirmation of targeted attacks using it. Experts...
Canada’s craft beer competition ends in chaos over AI judges
A major Canadian craft beer competition has become the center of controversy after unexpectedly introducing artificial intelligence into the beverage ...
Artificial General Intelligence (AGI): the first global standard for measuring it has been defined
On October 21, 2025, an international team of researchers from 29 leading institutions—including Stanford University, MIT, and the University of Cal...
$2.5 billion: The cost of the Jaguar Land Rover cyber attack.
Jaguar Land Rover continues to deal with the fallout from the cyber attack that paralyzed production, disrupted its dealer network, and jeopardized su...
Court orders NSO Group to stop using spyware against WhatsApp
A federal court has ordered Israeli company NSO Group (developer of the commercial spyware Pegasus) to stop using spyware to target and attack WhatsAp...