Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
LECS 320x100 1
Crowdstriker 970×120

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Redazione RHC
(12314 articoli, 10918 italiano, 1396 inglese)12314 articoli
10918 italiano, 1396 inglese

The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.

Ultimi articoli di Redazione RHC

The Warlock Group: A New Player in the Ransomware Market
The Warlock group, also known as Storm-2603 and GOLD SALEM , has gone from being a newcomer to a major player in the ransomware market in just a few m...
FBI warns of fake websites impersonating IC3 to commit fraud
The FBI has issued a warning : scammers are impersonating the Internet Fraud Complaint Center (IC3) website to commit financial fraud or steal visitor...
Apple attacks Google Chrome: “Switch to Safari to protect your privacy.”
Apple has issued a stern warning: stop using Google Chrome. The world’s most popular browser is competing with both desktops and smartphones, gradua...
PureVPN on Linux: Researcher Finds Security and Anonymity Issues
An independent researcher named Andreas, who runs the blog Anagogistis , has discovered serious vulnerabilities in Pure VPN’s Linux clients that com...
Ally Solos AI Glasses for the Visually Impaired: Autonomy and Safety
Envision’s Ally Solos AI glasses are a breath of fresh air for people with visual impairments, helping them read , orient themselves and understand ...
When Unicode Becomes a Weapon and Your Email Betrays You, Inboxfuscation Arrives
Attackers are increasingly using Microsoft Exchange inbox capabilities to ensure persistence and steal sensitive information within corporate networks...
Scattered Spider: The teenage genius who hacked Las Vegas is in custody.
A series of high-profile attacks on the Las Vegas gambling industry in 2023 has now reached its final phase. Several major casinos have been victims o...
Cyberattacks on European airports: ENISA identifies ransomware
The European Union Agency for Information Security (ENISA) has announced that it has identified the type of ransomware responsible for the serious dis...
First malware with integrated GPT-4 discovered: MalTerminal arrives
SentinelLABS researchers have discovered what they describe as the first known example of malware with integrated LLM functionality , dubbed MalTermin...
The winners of the AI race? Electricians and plumbers.
In an interview with Channel 4 News, Nvidia CEO Jensen Huang said that in the race to succeed in the AI era, “the big winners will be electricians a...
SonicWall warns customers to change credentials after security breach
SonicWall has warned its customers to change their login credentials as soon as possible. A cyberattack on MySonicWall accounts compromised firewall c...
“He doesn’t understand me, but ChatGPT does”: The 21st-century love triangle
The American magazine Futurism has described a new conflict at the intersection of technology and personal life: artificial intelligence bots like Cha...
From Leash to Autonomy: Ban, Nvidia Block, and Huawei’s AI Cluster Solutions
China’s Huawei has taken a major step in developing its own artificial intelligence infrastructure. The company has unveiled solutions designed to i...
Elon Musk unveils Colossus II, the one-gigawatt AI supercomputer
Elon Musk shared a photo of the complex housing Colossus II, the world’s first gigawatt-scale AI cluster. Elon Musk has previously stated that the C...
Vulnerability in Windows RPC protocol: Spoofing and impersonation attacks reported
SafeBreach experts have disclosed details of a vulnerability in the Windows Remote Procedure Call (RPC) protocol, patched by Microsoft in the July 202...