Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
UtiliaCS 320x100
Banner Ransomfeed 970x120 1

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Redazione RHC
(12321 articoli, 10922 italiano, 1399 inglese)12321 articoli
10922 italiano, 1399 inglese

The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.

Ultimi articoli di Redazione RHC

Scattered LAPSUS$ Hunters Group Returns and Threatens to Release Salesforce Data
A group calling itself Scattered LAPSUS$ Hunters has resurfaced after months of silence and the arrest of its members. On a new leak site, the attacke...
WhatsApp Alert: New Malware Spreads Like a Virus Among Contacts
Trend Micro researchers have detected a large-scale malware campaign targeting users in Brazil. It is distributed via the desktop version of WhatsApp ...
ChatGPT becomes a social media platform: private messaging is coming soon.
OpenAI appears to be preparing ChatGPT to become a social platform, not just a traditional AI-powered chat app. The company already has Sora 2, which ...
25,000 kilometers, the new Seacom2.0 submarine cable to connect Europe, Africa and Asia
Seacom, an African submarine infrastructure operator, has announced the launch of Seacom 2.0 , an international cable system designed to connect Europ...
DeepSeek challenges AI giants: 50% cost and API cuts
The Chinese company DeepSeek has presented an experimental version of its language model, DeepSeek-V3.2-Exp, which for the first time implements its o...
Oracle E-Business Suite 9.8 Vulnerability: Urgent Updates Needed
Oracle has published a security advisory regarding a critical vulnerability identified as CVE-2025-61882 in the Oracle E-Business Suite . The flaw can...
iPad with M5 chip spotted: Promising performance on Geekbench
An unknown iPad with an M5 chip has been spotted on Geekbench . The device scored 4,133 in the single-core test and 15,437 in the multi-core test . Th...
China launches underwater data center to reduce carbon footprint
China is preparing to launch one of the first commercial underwater data center projects . In mid-October, a capsule containing servers will be lowere...
When AI writes poetry: is the future of human creativity over?
In 1950, Alan Turing, considered the father of artificial intelligence, was still wondering “Can machines think?” Today, more than seventy years l...
The AI we love! From years to just months to discover a molecule for Crohn’s disease
Antibiotics for inflammatory bowel disease can be a double-edged sword. While they suppress inflammation, they also kill beneficial bacteria, not just...
Discord Confirms Hack Attack: Sensitive Information at Risk
A third-party customer service provider was compromised by hackers, who gained access to partial payment information and personally identifiable infor...
US raises alarm over core chip manufacturing: Too dependent on China by 2030
On October 2, the Financial Times published an analysis by Mike Kuiken, a senior national security adviser and fellow at the Hoover Institution. The e...
Can a backdoor be implemented for only one country? Apple resists UK demands.
The United Kingdom has again attempted to force Apple to access encrypted backups of user data stored on iCloud . The new request comes six months aft...
KaruHunters Claims Cyber Attack on RIPE NCC
A post recently appeared on a popular underground forum that’s attracting the attention of the cybersecurity community. A user with the handle KaruH...
Microsoft IIS under attack from Chinese criminal hackers: How UAT-8099 exploits authoritative websites
A Chinese cybercriminal group known as UAT-8099 has been identified by Cisco Talos as responsible for a large-scale attack campaign. The attacks, whic...