Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Banner Mobile
TM RedHotCyber 970x120 042543

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Redazione RHC
(12314 articoli, 10918 italiano, 1396 inglese)12314 articoli
10918 italiano, 1396 inglese

The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.

Ultimi articoli di Redazione RHC

Balancing speed and security! This is the real challenge of Vibe Coding.
The cybersecurity industry is undergoing a transformation: artificial intelligence is becoming not just a tool for developers, but also a weapon for a...
Three serious vulnerabilities discovered in VMware vCenter and NSX: apply patches immediately.
On September 29, 2025, Broadcom released security advisory VMSA-2025-0016 , addressing three vulnerabilities identified in VMware vCenter and VMware N...
0-day 0-click WhatsApp! All it takes is one image to take control of your iPhone.
Some spyware producer is probably doing gymnastics… tearing their hair out. But it’s the usual charade: someone finds, someone cashes in, someone ...
Computer science graduates with no future! Thousands of resumes ignored, and goodbye to six-figure salaries.
Alarming trends are emerging in the IT job market. More and more computer science graduates are unable to find work, even at minimum wage. A computer ...
The US wants to hack Telegram! The case sparks debate over privacy and jurisdiction.
The U.S. Department of Justice has received court authorization to conduct a remote inspection of Telegram’s servers as part of an investigation int...
As Windows 10 retires, Windows 7 installs double in two months
Windows 7 was one of Microsoft’s best operating systems, and many still praise its stability today . But Microsoft discontinued support for this ope...
Bill Gates: Programmers are not at risk! AI is a tool, not a competitor.
Artificial intelligence is rapidly changing traditional professions. Just yesterday, we reported that the demand for software engineers has dropped 71...
Global attacks on Cisco devices: Cyber agencies warn of ongoing crisis
Major agencies around the world have raised the alarm about a critical threat to network infrastructure: vulnerabilities in Cisco Adaptive Security Ap...
A DLL hijacking bug targets Notepad++. Risk of arbitrary code execution.
A critical DLL hijacking vulnerability has been identified in Notepad++ version 8.8.3 by security researchers, with the flaw assigned CVE-2025-56383. ...
Google Project Zero Researcher Reveals How to Bypass ASLR on macOS and iOS
A researcher on Google’s Project Zero team has revealed a new method for remotely exfiltrating memory addresses on Apple’s macOS and iOS operating...
Make training an adventure! Choose Betti RHC for your cybersecurity awareness.
Are you tired of boring e-learning training courses? Do you really want to educate your company’s employees about bad and erroneous behaviors so you...
The pregnancy robot is coming! Is it fake news or a harbinger of things to come?
Earlier this month, news emerged about Chinese company Kaiwa Technology , which had reportedly created a “pregnancy robot.” The news was accompani...
Critical flaws in Chinese robots. A zombie robot bonet can be remotely controlled.
On September 27, 2025, new concerns emerged about robots produced by China’s Unitree Robotics , after serious vulnerabilities were reported that cou...
Akira Ransomware: New Campaign Targets SonicWall Firewalls
Since late July 2025, a new wave of cyber attacks has been recorded targeting organizations equipped with SonicWall firewalls, with the active spread ...
Fujitsu unveils Post-K: the ARM supercomputer that will be 100 times faster than “K”
After having signed the contract to build the Japanese supercomputer “K,” one of the most powerful in the world, Fujitsu has announced a new flags...