Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Enterprise BusinessLog 320x200 1
Redhotcyber Banner Sito 970x120px Uscita 101125

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Redazione RHC
(12314 articoli, 10918 italiano, 1396 inglese)12314 articoli
10918 italiano, 1396 inglese

The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.

Ultimi articoli di Redazione RHC

Zorin OS 18: The new beta version is now available
Zorin OS has released a beta version of its new release, Zorin OS 18. Currently, only the GNOME-based Core edition is available , without the propriet...
Forget brains and notebooks! ChatGPT dominates classrooms.
ChatGPT usage has skyrocketed with the start of the new school year in the West, with token generation hitting record levels. According to OpenRouter ...
A US agency was hacked due to an unresolved patch. CISA: Conduct vulnerability assessments!
Experts at the U.S. Cybersecurity and Infrastructure Security Agency (CISA) have reported a serious incident: hackers gained access to the network of ...
Ransomware attack on European airports leaves Berlin in “emergency mode”
Berlin Airport (BER) remains in “emergency mode” for the fifth day after a major cyberattack on its supply chain. Der Spiegel reported the news in...
Commodore 64: From the Legend of the ’80s to 2025! 10,000 New Consoles Sold
Commodore Corporation BV was recently acquired by fans and former employees. Now, the new Commodore brand has announced a significant milestone: the f...
Two critical bugs in Cisco ASA and FTD: score 9.9 and risk of remote code execution
Cisco has disclosed two critical vulnerabilities affecting its Secure Firewall Adaptive Security Appliance (ASA) and Secure Firewall Threat Defense (F...
Linux dances the samba… but hits a race condition. A critical flaw threatens the kernel.
Trend Research researcher Nicholas Zubrisky has reported a critical vulnerability in the ksmbd component of the Linux kernel that allows remote attack...
They slept on networks for 393 days! Chinese state hackers and the BRICKSTORM backdoor
According to Google Threat Intelligence , the China-linked espionage group UNC5221 has carried out a series of successful intrusions into corporate ne...
Code as we knew it is dead! Artificial Intelligence writes the future.
Since 2013, the IEEE has published an annual interactive ranking of the most popular programming languages . However, traditional methods of measuring...
Cryptocurrencies, ransomware, and hamburgers: the fatal combo for Scattered Spider
The U.S. Department of Justice and British police have charged Talha Jubair, 19, a resident of East London, who investigators believe is a key member ...
The freebie party is over! Open source infrastructure is at risk and needs funding.
An open letter signed by major open source foundations has raised the alarm about the future of the infrastructure that supports modern software devel...
Zero-Day Vulnerabilities Found in Cisco IOS and IOS XE: Urgent Updates
Cisco has disclosed a zero-day vulnerability, tracked as CVE-2025-20352, in its widely used IOS and IOS XE software; this vulnerability appears to be ...
Artificial Intelligence: A Double-Edged Sword in Digital Security
Artificial intelligence is increasingly being described as a double-edged sword, capable of offering enormous advantages but also opening new avenues ...
Kali Linux 2025.3 is out! A new release with improvements and new tools.
Kali Linux developers have released a new release, 2025.3 , which expands the distribution’s functionality and adds ten new penetration testing tool...
Critical bug in Salesforce CLI: Arbitrary code execution and SYSTEM access
A critical vulnerability in the Salesforce CLI installer (sf-x64.exe) allows attackers to gain arbitrary code execution, privilege escalation, and SYS...