Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
320x100 Itcentric
Enterprise BusinessLog 970x120 1

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Redazione RHC
(12314 articoli, 10918 italiano, 1396 inglese)12314 articoli
10918 italiano, 1396 inglese

The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.

Ultimi articoli di Redazione RHC

Google Chrome: Urgent patch for exploited 0day. Critical vulnerabilities fixed.
Google has taken immediate security action for Chrome browser users globally, targeting four critical vulnerabilities, one of which, a zero-day vulner...
Phishing with style! Cybercriminals attach superhero GIFs to malware.
F6 analysts have published a study on a new phishing campaign active from spring 2025. The group, dubbed ComicForm, sent emails containing malicious a...
Azure Functions in the Spotlight: Legitimate Libraries Used for DLL Sideloading
A malicious version of the ISO image named Servicenow-BNM-Verify.iso has been identified on VirusTotal, reported as originating from Malaysia, with vi...
Linux Hit by Sindoor Dropper: Highly Obfuscated Infection Chain
Linux systems are being targeted by a recent malware campaign, known as “Sindoor Dropper,” which uses advanced spear-phishing techniques and a com...
A manifesto after 72 hours! Will cybercriminals really retreat?
Fifteen of the most notorious cybercriminal groups, including Scattered Spider, ShinyHunters, and Lapsus$, have announced their closure. Their collect...
Incitement to Suicide and OpenAI. New Security Measures Introduced for ChatGPT
OpenAI has announced new security measures for ChatGPT following a series of tragic stories and lawsuits accusing the chatbot of involvement in teen s...
Next Cybersecurity: Fight AI with Artificial Intelligence
The Artificial Intelligence Security Governance Forum was held in Kunming, Yunnan Province, southwestern China, as part of the National Cybersecurity ...
Taiwan raises alert: Monitoring submarine cables for Chinese interference
In the Taiwan Strait, the local Coast Guard ha intensified patrolling activities To protect the undersea cables, infrastructure considered vital to th...
SlopAds: 38 million app installs sending 2.3 billion offers per day
A massive ad fraud scheme called SlopAds has been hiding behind hundreds of “harmless” Android apps and has reached global proportions. Recently, ...
Apple warns users of targeted spyware attacks
CERT-FR reported that Apple warned users late last week that their devices were being targeted by spyware attacks. Experts say they are aware of at le...
Google changes Android strategy: no more monthly patches, only risk-based fixes.
Google has changed its Android security update strategy, breaking its tradition of disclosing vulnerabilities monthly for the first time in a decade. ...
ShinyHunters violates Gucci, Balenciaga, and Alexander McQueen: $7.4 million worth of records exposed
Kering, the luxury and fashion giant, has officially announced that a data breach was perpetrated against customers of its leading brands, including G...
Perl returns to the top 10 most popular programming languages
TIOBE Software has released its September ranking of the most popular programming languages. The highlight of the publication was Perl’s return to t...
Hacker Scattered LAPSUS$ Hunters: Unauthorized Access to Google LERS
Google executives said that hackers created a fake account on the Law Enforcement Request System (LERS), the company’s platform used by law enforcem...
An e-cigarette becomes a web server. And let hacking be!
Richard Stallman said many years ago “Playfully doing something difficult, whether it’s useful or not, that’s hacking!” Romanian engineer and ...