Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Crowdstrike 320×100
Enterprise BusinessLog 970x120 1

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Redazione RHC
(12314 articoli, 10918 italiano, 1396 inglese)12314 articoli
10918 italiano, 1396 inglese

The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.

Ultimi articoli di Redazione RHC

Microsoft Patch Tuesday: 175 vulnerabilities fixed and two zero-days exploited
In its latest update, the tech giant fixed 175 vulnerabilities affecting its core products and underlying systems, including two actively exploited ze...
Microsoft warns about uncontrolled use of ‘shadow’ AI in the workplace
While Microsoft actively promotes its Copilot tools for businesses, the company also warns of the dangers of uncontrolled use of “shadow” AI by em...
12 security bugs discovered in Ivanti Endpoint Manager (EPM). Update now!
Ivanti has published 13 vulnerabilities in its Endpoint Manager (EPM) software , including two high-severity flaws that could allow remote code execut...
A PNG containing a Trojan. Astaroth persistently abuses GitHub.
McAfee researchers have reported new activity by the Astaroth banking trojan , which has started using GitHub as a persistent channel for distributing...
Satellites targeted! Thousands of phone conversations and text messages intercepted.
Satellite communications links used by government agencies, the military, businesses, and mobile operators have been discovered to be the source of a ...
Nanochat: Create your own LLM, train it, and get it running on your PC for $100
Developer Andrej Karpathy has unveiled nanochat , a minimalist, fully open-source version of ChatGPT that can be trained and run on a single computer....
WhatsApp Web in the crosshairs! How the worm that distributes the banking Trojan works
Sophos analysts have discovered a complex malware operation by security experts that uses the popular messaging service WhatsApp to spread banking Tro...
Goodbye Microsoft Word. China chooses WPS Office for official documents
China continues to pursue technological independence, and this time the signal has come not from microchip manufacturers, but from government official...
RMPocalypse: A critical bug in AMD SEV-SNP threatens cloud security.
A critical vulnerability has been identified in the AMD SEV-SNP hardware security architecture, impacting major cloud providers (AWS, Microsoft Azure,...
Poisoned AI! 250 Malicious Documents Are Enough to Compromise an LLM
Researchers at Anthropic, in collaboration with the UK government’s AI Safety Institute, the Alan Turing Institute, and other academic institutions,...
Spyware yes, spyware no: it’s just a prospect! NSO Group is now under US control.
Israeli company NSO Group, developer of the infamous Pegasus spyware , recently came under the control of American investors. A company spokesperson a...
The AI bubble: fears of a new technological meltdown grow
At DevDay, OpenAI’s annual conference this week, CEO Sam Altman took questions from reporters, an increasingly rare occurrence among tech leaders. A...
DAS: The world’s ear hidden in submarine cables
Over 1.2 million kilometers of fiber optic cables lie on the ocean floor, long considered solely part of a global telecommunications network. However,...
Hacker culture pioneer Peter Samson plays “Boards of Canada” on PDP-1
In a world where music has long since migrated to streaming and digital platforms, one enthusiast decided to go back six decades, to a time when melod...
Critical vulnerabilities in Microsoft Defender for Endpoint: security risks
Security flaws have been discovered in network communication between Microsoft Defender for Endpoint (DFE) cloud services , allowing attackers, follow...