Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Redhotcyber Banner Sito 320x100px Uscita 101125
970x120

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Redazione RHC
(12314 articoli, 10918 italiano, 1396 inglese)12314 articoli
10918 italiano, 1396 inglese

The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.

Ultimi articoli di Redazione RHC

Microsoft challenges Nvidia and AMD with its proprietary chips for artificial intelligence.
Microsoft is accelerating the in-house production of semiconductors for its data centers, aiming to reduce its dependence on external suppliers like N...
China mandates AI content labels. Let’s see what’s happening.
Starting September 1, 2025, all artificial intelligence (AI)-generated content in China must be marked with an “electronic watermark,” according t...
MatrixPDF arrives: just a few clicks and phishing is served!
A new phishing toolkit, MatrixPDF , has been discovered that allows attackers to transform ordinary PDF files into interactive decoys that bypass emai...
A critical bug in VMware Aria Operations and VMware Tools has been exploited by Chinese hackers for months.
Broadcom has fixed a severe privilege escalation vulnerability in VMware Aria Operations and VMware Tools that was exploited in attacks starting in Oc...
With 50 dollars and physical access to the server, the Cloud goes to hell
A team of researchers has developed a simple hardware tool that challenges the fundamental principles of trusted computing in modern cloud environment...
Not the children! 8,000 personal data of children from a nursery school are at risk of being published.
A criminal hacker group calling itself Radiant has claimed responsibility for stealing the personal data of over 8,000 children enrolled in daycare ce...
Programming in crisis: Junior job openings plummet as AI transforms the workplace.
Artificial intelligence is no longer a futuristic concept from science fiction films . It is already part of our daily lives and, above all, it is rev...
Work, Artificial Intelligence, and Marketing: What Skills Will We Need in 2025?
In recent years, the marketing industry has undergone a radical transformation : today, one in two positions requires artificial intelligence skills. ...
Nvidia CEO: “The gap with China is just a few nanoseconds.”
On September 25, during the interview program Bg2 Pod , Nvidia CEO Jen-Hsun Huang expressed positions that fueled heated public debate. During his spe...
Microsoft launches Agent Mode in Excel and Word! Fewer formulas and more artificial intelligence.
Microsoft has launched Agent Mode, an AI-powered feature in Excel and Word that automatically creates complex spreadsheets and text documents with a s...
Goodbye, real-life stars? Here comes Tilly Norwood, the first AI actress!
In an industry once dominated by live-action stars, digital characters are increasingly gaining traction. At a summit in Zurich, actress, comedian, an...
From user to root in a second! CISA warns: millions of operating systems at risk. Patch!
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical vulnerability in the popular Sudo utility, used on Linux and Uni...
HarmonyOS: 1 billion devices and a growing open-source ecosystem
The Open Source Hongmeng Technology Conference 2025, recently held in Changsha, highlighted the achievements of HarmonyOS ” Hongmeng ” (鸿蒙), t...
Back to the On-Prem: Austrian Armed Forces Choose LibreOffice
In recent years, many companies have gone cloud-first , outsourcing critical infrastructure and business services to platforms managed by external pro...
Digital Crisis Management: Communication Is the Key to Success or Failure
In recent years, cyberattacks have become a major threat to businesses, regardless of industry. While technical departments focus on troubleshooting a...