Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
320×100
LECS 970x120 1

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Redazione RHC
(12314 articoli, 10918 italiano, 1396 inglese)12314 articoli
10918 italiano, 1396 inglese

The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.

Ultimi articoli di Redazione RHC

China challenges Intel: Loongson launches fully independent 3C6000 CPU
Wang Songyu , Deputy General Manager of Loongson Technology ‘s Business Division, reaffirmed on October 18 the company’s strategy of developing fu...
Intel releases urgent patches for new Spectre variant
VUSec researchers have presented a paper titled “Training Solo,” which challenges the fundamental principles of protection against Spectre-v2 atta...
Blockchain at risk! The quantum threat is a race against time
The race for quantum supremacy is turning into a race for cryptocurrency survival . If quantum computers reach the promised power, they will be able t...
The Most Famous Hacker Girls Ever: Anna Chapman and the Illegal Program
Anna Chapman was a Russian intelligence agent who was arrested on charges of working as a spy for the Moscow government in June 2010 while living in N...
The Most Famous Hacker Girls Ever: Joanna Rutkowska
Joanna Rutkowska was born in Warsaw, Poland, in 1981 and is a software engineer known primarily for her malware and low-level security research. She i...
The 6 Best Hacker Girls of All Time
We often talk about hacking, hackers, cybercrime, black, gray, and white. But is “hacker” always synonymous with the male gender? The answer is ob...
Famous hackers: Albert Gonzalez, called Soupnazi
Born to Cuban parents in 1981, Albert Gonzalez attended South Miami High School in Miami, Florida. He was accused of acquiring and reselling over 180 ...
The most famous female hackers ever: Kimberley Vanvaeck aka Gigabyte.
Gigabyte is the pseudonym of Kimberley Vanvaeck, a Belgian hacker known for writing numerous high-end malware, as well as for a long-running dispute w...
The Most Famous Hacker Girls Ever: Kristina Svechinskaya
In the collective imagination, the word “hacker” or “computer criminal” is a young man with enormous computer skills, but history has taught u...
Famous Hackers: The Story of Adrian Lamo
Adrian Lamo was a hacker who found new ways to breach companies and make them realize how insecure they were. From his early hacks to hacking into pre...
Famous hackers: Vladimir Levin and the first online bank robbery.
Today we’ll meet another hacker from the past. He’s Vladimir Levin, a Russian hacker from St. Petersburg (Владимир Леонидович Л...
Famous Hackers: Mafia Boy, the DDoS Wizard
Today we’ll learn about another great black hacker from the past. We’ll talk about Michael Calce, better known as Mafiaboy, one of the most famous...
Lenovo launches the ThinkBook Plus G6 Rollable 2025 with a rollable display.
Tech giant Lenovo has officially started selling the ThinkBook Plus G6 Rollable 2025 , the world’s first laptop with a rollable display , previewed ...
Cyber Attack on European Airports: Everest Ransomware Claims Claim
On September 20, we reported on a cyberattack that paralyzed several European airports, including Brussels, Berlin, and London Heathrow. This was a su...
Online PoC for 7-Zip flaws: Exploit allows arbitrary code execution
A proof-of-concept exploit has been developed for two critical vulnerabilities in the popular 7-Zip archiving software. These vulnerabilities could be...