Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Redhotcyber Banner Sito 320x100px Uscita 101125
Banner Desktop

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Redazione RHC
(12314 articoli, 10918 italiano, 1396 inglese)12314 articoli
10918 italiano, 1396 inglese

The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.

Ultimi articoli di Redazione RHC

Between AI and fear, Skynet teaches: “We’ll build bunkers before launching AGI.”
The quote, “We’ll definitely build a bunker before we launch AGI,” that inspired the article, was attributed to a Silicon Valley leader, though ...
GitHub is migrating to Azure! And goodbye to new development for a year.
When Microsoft acquired GitHub in 2018, the company tried to stay away. The platform developed relatively independently until things began to change i...
China dominates industrial robotics: 2 million machines in factories
China is consolidating its position as a global manufacturing powerhouse thanks to an unprecedented pace of production and installation of industrial ...
RDP Services Exposed in the Crosshairs! A Botnet of 100,000 IPs Scans the Network
In the United States, a large-scale, coordinated botnet campaign is targeting Remote Desktop Protocol (RDP)-based services. The scale and organization...
Everyone’s Hacking iPhones! Apple Increases iOS Reward to $5 Million
Apple has significantly expanded its bounty program for security vulnerabilities in the iOS ecosystem. At the Hexacon offensive security conference in...
Artificial intelligence = Alcohol for teens! It damages social and cognitive skills
Today’s students are increasingly turning to artificial intelligence, not only for study aids, but also for social interaction and emotional support...
Velociraptor used in active attacks to distribute LockBit and Babuk ransomware
Hackers have begun using Velociraptor , the digital forensics and incident response (DFIR) tool, to launch LockBit and Babuk ransomware attacks. Cisco...
SonicWall confirms data breach. Cloud backup service customers at risk.
SonicWall confirmed that a data breach last month affected all customers using the company’s cloud backup service. As a result, firewall configurati...
RondoDox Botnet Discovered: Thousands of Devices at Risk
A large botnet called RondoDox has been discovered exploiting 56 vulnerabilities in more than 30 different devices, including bugs first demonstrated ...
Microsoft Defender incorrectly flags SQL Server 2019 as End of Life
We know that product end-of-life (EoL) brings security risks and the accumulation of vulnerabilities, as manufacturers stop releasing corrective patch...
The Truth About Windows XP License Key: FCKGW-RHQQ2-YXRKT-8TG6W-2B7Q8
On October 10, new revelations emerged regarding one of the most notorious license keys in computing history: FCKGW-RHQQ2-YXRKT-8TG6W-2B7Q8 , tied to ...
Intel and NVIDIA: From Historic Rivals to Partners in the New Artificial Intelligence Market
During an interview with Mad Money host Jim Cramer, NVIDIA CEO Jen-Hsun Huang recalled a key moment from his time with Intel. The interview, reported ...
7-Zip Vulnerable: Symbolic Link Exploit Allows Malicious Code Injection
Two critical vulnerabilities in the 7-Zip archiver allowed remote code execution when processing ZIP files. The flaws affect how the program handles s...
Salesforce refuses to pay ransom for Scattered Lapsus Hunters attacks
Salesforce representatives have announced that they have no intention of negotiating or paying a ransom to the attackers responsible for a series of l...
40,000 iPhones stolen and shipped to Asia: London police arrest international gang
London police announced that Operation Echosteep has uncovered and dismantled a gang responsible for mass iPhone thefts. Investigators estimate the gr...