Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Banner Mobile
970x20 Itcentric

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Redazione RHC
(12318 articoli, 10920 italiano, 1398 inglese)12318 articoli
10920 italiano, 1398 inglese

The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.

Ultimi articoli di Redazione RHC

Huawei launches data center AI card: Atlas 300I DUO, dual GPU, 140 TFLOPS
On October 19, Gamers Nexus revealed details of the Huawei Atlas 300I DUO , a dual-core AI inference card designed for intelligent computing in data c...
Critical vulnerability in Windows SMB client: CISA raises alarm
On October 20, 2025, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an urgent alert regarding a critical vulnerability, CVE-2...
NIS2 and new ACN guidelines: what changes for companies and how to prepare
The European NIS2 directive represents a turning point for cybersecurity in Italy and Europe, imposing new responsibilities on public and private orga...
RHC’s HackerHood Reveals Two New 0days on Zyxel Products
Security researcher Alessandro Sgreccia , a member of Red Hot Cyber’s HackerHood team, has reported two new vulnerabilities to Zyxel affecting sever...
F5 BIG-IP Vulnerability: 266,000 Devices at Risk Worldwide! 2,500 in Italy
The Cybersecurity and Infrastructure Security Agency (CISA) and the Multi-State Information Sharing & Analysis Center (MS-ISAC) are issuing this J...
Amazon Web Services Cloud Outage, Global Issues
A major outage in Amazon Web Services (AWS) cloud services has caused widespread connection issues around the world, affecting major platforms such as...
Google Announces Gemini 3.0: Artificial Intelligence Evolves Toward AGI
At the Dreamforce conference in San Francisco, Google CEO Sundar Pichai announced that Google will release a new version of its artificial intelligenc...
They’re Coming! Unitree Robotics Launches the H2 Destiny Awakening Humanoid
Chinese company Unitree Robotics has challenged the leadership of American robotics with the launch of its H2 “Destiny Awakening” humanoid robot. ...
The Intel 386 processor turns 40: the 32-bit era began
October 20, 2025, marks a significant anniversary in the history of computing: the Intel 80386 processor, also known as the i386 , celebrates its 40th...
Lancelot, the secure federated learning system
A team of researchers in Hong Kong has released a system called Lancelot, which represents the first practical implementation of federated learning wh...
ChatGPT writes the perfect scam… but the scammer leaves the AI instructions inside.
At first glance, the email seemed flawless. A well-structured PagoPA payment reminder , with formal language, references to the Highway Code and even ...
Critical vulnerability in Linux-PAM: Privilege escalation with CVE-2025-8941
A high-severity vulnerability has been identified in the Pluggable Authentication Modules (PAM) framework with the identifier CVE-2025-8941. This vuln...
Gmail introduces trusted contacts to recover accounts
A new Gmail security feature will allow users to restore access to their accounts with the help of friends or family. Trusted contacts (Recovery Conta...
China accuses US of cyber attack on National Time Service Center
China’s Ministry of State Security announced it has discovered “irrefutable evidence” of a cyberattack on the National Time Service Center, the ...
Made in China! Muxi presents the Xiyun C600 general-purpose GPU
Muxi Integrated Circuit (Nanjing) Co., Ltd. officially unveiled the Xiyun C600 , the first general-purpose GPU entirely made in China , marking a cruc...