Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Banner Ransomfeed 320x100 1
Banner Ancharia Desktop 1 1

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Redazione RHC
(12314 articoli, 10918 italiano, 1396 inglese)12314 articoli
10918 italiano, 1396 inglese

The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.

Ultimi articoli di Redazione RHC

25,000 kilometers, the new Seacom2.0 submarine cable to connect Europe, Africa and Asia
Seacom, an African submarine infrastructure operator, has announced the launch of Seacom 2.0 , an international cable system designed to connect Europ...
DeepSeek challenges AI giants: 50% cost and API cuts
The Chinese company DeepSeek has presented an experimental version of its language model, DeepSeek-V3.2-Exp, which for the first time implements its o...
Oracle E-Business Suite 9.8 Vulnerability: Urgent Updates Needed
Oracle has published a security advisory regarding a critical vulnerability identified as CVE-2025-61882 in the Oracle E-Business Suite . The flaw can...
iPad with M5 chip spotted: Promising performance on Geekbench
An unknown iPad with an M5 chip has been spotted on Geekbench . The device scored 4,133 in the single-core test and 15,437 in the multi-core test . Th...
China launches underwater data center to reduce carbon footprint
China is preparing to launch one of the first commercial underwater data center projects . In mid-October, a capsule containing servers will be lowere...
When AI writes poetry: is the future of human creativity over?
In 1950, Alan Turing, considered the father of artificial intelligence, was still wondering “Can machines think?” Today, more than seventy years l...
The AI we love! From years to just months to discover a molecule for Crohn’s disease
Antibiotics for inflammatory bowel disease can be a double-edged sword. While they suppress inflammation, they also kill beneficial bacteria, not just...
Discord Confirms Hack Attack: Sensitive Information at Risk
A third-party customer service provider was compromised by hackers, who gained access to partial payment information and personally identifiable infor...
US raises alarm over core chip manufacturing: Too dependent on China by 2030
On October 2, the Financial Times published an analysis by Mike Kuiken, a senior national security adviser and fellow at the Hoover Institution. The e...
Can a backdoor be implemented for only one country? Apple resists UK demands.
The United Kingdom has again attempted to force Apple to access encrypted backups of user data stored on iCloud . The new request comes six months aft...
KaruHunters Claims Cyber Attack on RIPE NCC
A post recently appeared on a popular underground forum that’s attracting the attention of the cybersecurity community. A user with the handle KaruH...
Microsoft IIS under attack from Chinese criminal hackers: How UAT-8099 exploits authoritative websites
A Chinese cybercriminal group known as UAT-8099 has been identified by Cisco Talos as responsible for a large-scale attack campaign. The attacks, whic...
Computer science is no longer a safe career! What’s changing for students and companies?
For decades, computer science was considered a stable career choice, brimming with opportunities. Today, however, students, universities, and business...
China cracks down on fake news generated by artificial intelligence
The Cyberspace Administration of China has announced the launch of a two-month nationwide campaign, which began on July 24 , aimed at countering the s...
China under surveillance: Users sanctioned for spreading fake news online
In recent months, Hainan public security authorities have launched investigations and imposed administrative sanctions against several internet users ...