Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Redhotcyber Banner Sito 320x100px Uscita 101125
Banner Desktop

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Redazione RHC
(12314 articoli, 10918 italiano, 1396 inglese)12314 articoli
10918 italiano, 1396 inglese

The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.

Ultimi articoli di Redazione RHC

Bandiera turchia
Patchwork Launches Spear-Phishing Campaign Against Turkish Defense
The Patchwork group, also known by the aliases APT-C-09, APT-Q-36, Chinastrats, Dropping Elephant, Operation Hangover, Quilted Tiger, and Zinc Emerson...
Hackers don’t want to save you: they want to erase you.
Hackers are increasingly targeting backups – not systems or servers, but the data that companies retain for a limited period of time so they can rec...
The Story of Microsoft Solitaire: From Launch with Windows 3.0 to Enduring Success
Microsoft first released Solitaire in 1990 with Windows 3.0, as a tool to familiarize users with the graphical interface and mouse use. The game was c...
Removing private data from AI models? Now you can without accessing the original datasets.
A team from the University of California, Riverside, has demonstrated a new way to remove private and copyrighted data from AI models without accessin...
Edge vs. Chrome: Microsoft promotes its browser with aggressive ads on Bing
Microsoft has once again launched an aggressive campaign for its proprietary Edge browser. This time, the software giant is displaying a comprehensive...
Will Nvidia’s robotic brain revolutionize artificial intelligence and robotics?
On August 24, the official Nvidia Robotics account shared an image on social media of a black gift box accompanied by a greeting card signed by founde...
Qilin leads ransomware attacks as new groups emerge underground
Qilin continues to lead the way among all active crypto attack groups, significantly lagging behind its competitors in the number of reported incident...
RevengeHotels Improves VenomRAT with Artificial Intelligence
Kaspersky Lab experts have detected a new wave of attacks by the RevengeHotels group. A distinctive feature of this campaign is that many of the new m...
Security Alert: Vulnerability in Ivanti Endpoint Manager Mobile. CISA Warns
The U.S. Cybersecurity Agency (CISA) has issued an alert regarding two malware kits discovered on the network of an unidentified organization after ex...
Root in less than two minutes: How Phoenix exploits vulnerabilities in DDR5 module TRRs.
Anew variant of Rowhammer attacks has been developed that can bypass the latest security mechanisms in SK Hynix DDR5 chips. Dubbed Phoenix, the attack...
China kicks off the race for innovation with its first AI competition
The city of Karamay, Xinjiang, hosted the opening of the finals and exhibition of the first AI Applications Competition. The event, held at the Museum...
A major cyberattack hits European airports. Flights grounded.
On Saturday, September 20, 2025, a cyberattack hit a service provider used by several European airports, including Brussels, Berlin, and London Heathr...
Submarine Cables: Japan Declares War on Chinese Suppliers
After the United States decided to restrict access to undersea communications cables using Chinese technology, Japan also initiated a plan to inspect ...
A social network made entirely of bots! The University of Amsterdam experiment
Researchers at the University of Amsterdam conducted a novel experiment, creating a social network populated exclusively by artificial intelligence bo...
DeepSeek under fire: 50% of malicious code produced on sensitive queries
Specialists at CrowdStrike conducted a series of experiments with the Chinese artificial intelligence system DeepSeek, testing its code generation bas...