Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Fortinet 320x100px
970x20 Itcentric

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Redazione RHC
(12314 articoli, 10918 italiano, 1396 inglese)12314 articoli
10918 italiano, 1396 inglese

The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.

Ultimi articoli di Redazione RHC

Microsoft blocks access to cloud services for Israel’s Intelligence Unit 8200
The Israeli intelligence unit, the Israeli equivalent of the US National Security Agency (NSA), has been stripped of access to some Microsoft Azure cl...
Hackers hit the United States: critical federal infrastructure compromised
Hackers have breached Cisco networking equipment belonging to several US government agencies , Bloomberg reports. The cyber threat, which occurred on ...
Shocking collapse: -71% of job offers for software engineers in three years
A new Google report highlights how artificial intelligence is now an integral part of the daily work of technology professionals. The study, conducted...
Delivery of €13 million in submarine cables for the Shanhaiguan offshore project
At Haihui Port in Xiaoting, along the Yangtze River, a large red steel structure provided the backdrop for the delivery of a massive order of submarin...
Microsoft gives in to EU pressure: Windows 10 will get free security updates.
Microsoft has agreed to address the demands of European human rights activists and extend Windows 10 support to users in the European Economic Area (E...
New wave of malicious emails associated with the Hive0117 group
F6 has reported a new wave of malicious emails associated with the Hive0117 group. Hive0117 has been active since February 2022 and uses the DarkWatch...
An SVG file disguised as a PDF led victims to a fake login
Microsoft Threat Intelligence specialists have identified an attack in which attackers used artificial intelligence for the first time to disguise phi...
Airports shut down, ransomware, four days of chaos, and a suspect arrested. An attack that shook Europe.
On September 19, a major cyber incident occurred in Europe, affecting Collins Aerospace, one of the world’s largest aerospace technology suppliers ....
One added line of code and thousands of companies hacked. This is the magic of the Supply Chain!
Developers learned to trust the tools that help their AI assistants handle routine tasks, from sending emails to using databases. But this trust prove...
Rhadamanthys Stealer: Introduces an AI feature to extract seed phrases from images
Rhadamanthys is an advanced information stealer that first emerged in 2022. Featuring a rapid development cycle—with at least ten different releases...
Active Directory nel mirino! Come i criminal hacker rubano NTDS.dit
Active Directory (AD) contains the organization’s digital keys: unauthorized access to this service exposes sensitive information and credentials th...
YiBackdoor Arrives: What You Need to Know and How to Protect Your Network
In a new report, Zscaler ThreatLabz has revealed details of a new malware family called YiBackdoor , first observed in June 2025. From the outset, the...
Fezbox Malware: The NPM Package That Steals Cookies with QR Codes
Researchers discovered a malicious package called fezbox in npm that steals victims’ cookies. To ensure the malicious activity remains undetected, Q...
Two Dutch men arrested on suspicion of espionage with ties to Russia
Dutch police have arrested two 17-year-old boys on suspicion of espionage activities, with possible links to Russia, the Telegraaf newspaper reported ...
Ukrainian cyber attack paralyzes Russian SBP payment system
Cyber specialists from Ukraine’s defense intelligence have successfully carried out an attack that paralyzed Russia’s national payment system, SBP...