Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Fortinet 320x100px
Redhotcyber Banner Sito 970x120px Uscita 101125

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Redazione RHC
(12314 articoli, 10918 italiano, 1396 inglese)12314 articoli
10918 italiano, 1396 inglese

The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.

Ultimi articoli di Redazione RHC

NIS2 and new ACN guidelines: what changes for companies and how to prepare
The European NIS2 directive represents a turning point for cybersecurity in Italy and Europe, imposing new responsibilities on public and private orga...
RHC’s HackerHood Reveals Two New 0days on Zyxel Products
Security researcher Alessandro Sgreccia , a member of Red Hot Cyber’s HackerHood team, has reported two new vulnerabilities to Zyxel affecting sever...
F5 BIG-IP Vulnerability: 266,000 Devices at Risk Worldwide! 2,500 in Italy
The Cybersecurity and Infrastructure Security Agency (CISA) and the Multi-State Information Sharing & Analysis Center (MS-ISAC) are issuing this J...
Amazon Web Services Cloud Outage, Global Issues
A major outage in Amazon Web Services (AWS) cloud services has caused widespread connection issues around the world, affecting major platforms such as...
Google Announces Gemini 3.0: Artificial Intelligence Evolves Toward AGI
At the Dreamforce conference in San Francisco, Google CEO Sundar Pichai announced that Google will release a new version of its artificial intelligenc...
They’re Coming! Unitree Robotics Launches the H2 Destiny Awakening Humanoid
Chinese company Unitree Robotics has challenged the leadership of American robotics with the launch of its H2 “Destiny Awakening” humanoid robot. ...
The Intel 386 processor turns 40: the 32-bit era began
October 20, 2025, marks a significant anniversary in the history of computing: the Intel 80386 processor, also known as the i386 , celebrates its 40th...
Lancelot, the secure federated learning system
A team of researchers in Hong Kong has released a system called Lancelot, which represents the first practical implementation of federated learning wh...
ChatGPT writes the perfect scam… but the scammer leaves the AI instructions inside.
At first glance, the email seemed flawless. A well-structured PagoPA payment reminder , with formal language, references to the Highway Code and even ...
Critical vulnerability in Linux-PAM: Privilege escalation with CVE-2025-8941
A high-severity vulnerability has been identified in the Pluggable Authentication Modules (PAM) framework with the identifier CVE-2025-8941. This vuln...
Gmail introduces trusted contacts to recover accounts
A new Gmail security feature will allow users to restore access to their accounts with the help of friends or family. Trusted contacts (Recovery Conta...
China accuses US of cyber attack on National Time Service Center
China’s Ministry of State Security announced it has discovered “irrefutable evidence” of a cyberattack on the National Time Service Center, the ...
Made in China! Muxi presents the Xiyun C600 general-purpose GPU
Muxi Integrated Circuit (Nanjing) Co., Ltd. officially unveiled the Xiyun C600 , the first general-purpose GPU entirely made in China , marking a cruc...
9.9 Score! Microsoft Fixes Critical Vulnerability in ASP.NET Core
Microsoft has fixed a dangerous vulnerability in Kestrel web server for ASP.NET Core . It has been assigned the identifier CVE-2025-55315. The flaw al...
Boris Johnson is enthusiastic about AI: he uses ChatGPT for his books.
Former British Prime Minister Boris Johnson has expressed his enthusiasm for artificial intelligence, revealing in an interview that he uses ChatGPT t...