Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Crowdstrike 320×100
TM RedHotCyber 970x120 042543

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Redazione RHC
(12321 articoli, 10922 italiano, 1399 inglese)12321 articoli
10922 italiano, 1399 inglese

The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.

Ultimi articoli di Redazione RHC

Critical flaws in Chinese robots. A zombie robot bonet can be remotely controlled.
On September 27, 2025, new concerns emerged about robots produced by China’s Unitree Robotics , after serious vulnerabilities were reported that cou...
Akira Ransomware: New Campaign Targets SonicWall Firewalls
Since late July 2025, a new wave of cyber attacks has been recorded targeting organizations equipped with SonicWall firewalls, with the active spread ...
Fujitsu unveils Post-K: the ARM supercomputer that will be 100 times faster than “K”
After having signed the contract to build the Japanese supercomputer “K,” one of the most powerful in the world, Fujitsu has announced a new flags...
Microsoft blocks access to cloud services for Israel’s Intelligence Unit 8200
The Israeli intelligence unit, the Israeli equivalent of the US National Security Agency (NSA), has been stripped of access to some Microsoft Azure cl...
Hackers hit the United States: critical federal infrastructure compromised
Hackers have breached Cisco networking equipment belonging to several US government agencies , Bloomberg reports. The cyber threat, which occurred on ...
Shocking collapse: -71% of job offers for software engineers in three years
A new Google report highlights how artificial intelligence is now an integral part of the daily work of technology professionals. The study, conducted...
Delivery of €13 million in submarine cables for the Shanhaiguan offshore project
At Haihui Port in Xiaoting, along the Yangtze River, a large red steel structure provided the backdrop for the delivery of a massive order of submarin...
Microsoft gives in to EU pressure: Windows 10 will get free security updates.
Microsoft has agreed to address the demands of European human rights activists and extend Windows 10 support to users in the European Economic Area (E...
New wave of malicious emails associated with the Hive0117 group
F6 has reported a new wave of malicious emails associated with the Hive0117 group. Hive0117 has been active since February 2022 and uses the DarkWatch...
An SVG file disguised as a PDF led victims to a fake login
Microsoft Threat Intelligence specialists have identified an attack in which attackers used artificial intelligence for the first time to disguise phi...
Airports shut down, ransomware, four days of chaos, and a suspect arrested. An attack that shook Europe.
On September 19, a major cyber incident occurred in Europe, affecting Collins Aerospace, one of the world’s largest aerospace technology suppliers ....
One added line of code and thousands of companies hacked. This is the magic of the Supply Chain!
Developers learned to trust the tools that help their AI assistants handle routine tasks, from sending emails to using databases. But this trust prove...
Rhadamanthys Stealer: Introduces an AI feature to extract seed phrases from images
Rhadamanthys is an advanced information stealer that first emerged in 2022. Featuring a rapid development cycle—with at least ten different releases...
Active Directory nel mirino! Come i criminal hacker rubano NTDS.dit
Active Directory (AD) contains the organization’s digital keys: unauthorized access to this service exposes sensitive information and credentials th...
YiBackdoor Arrives: What You Need to Know and How to Protect Your Network
In a new report, Zscaler ThreatLabz has revealed details of a new malware family called YiBackdoor , first observed in June 2025. From the outset, the...