Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
320x100 Itcentric
LECS 970x120 1

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Redazione RHC
(12314 articoli, 10918 italiano, 1396 inglese)12314 articoli
10918 italiano, 1396 inglese

The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.

Ultimi articoli di Redazione RHC

Critical Linux Vulnerability: 0-Click N-Days Exploit Allows Remote Code Execution
A security researcher recently developed a zero-click exploit for the Linux SMB3 kernel daemon (ksmbd), exploiting two specific vulnerabilities. This ...
Security alert for AI servers: thousands are at risk
Artificial intelligence systems are increasingly under attack. This data emerges from “Trend Micro State of AI Security Report, 1H 2025“. The comp...
DeliveryRAT Trojan Alert: Hackers Steal Data and Money with Fake Apps
F6 and RuStore experts report having discovered and blocked 604 domains that were part of the infrastructure of hackers who infected mobile devices wi...
Vibe coding, yes, but be careful. Speed doesn’t always beat quality.
There’s a new phenomenon in the programming industry: vibe coding. Developers are increasingly using artificial intelligence agents to speed up thei...
The Great Firewall in the Spotlight: The Leak Revealing the Industrialization of Chinese Censorship
Edited by Luca Stivali and Olivia Terragni. On September 11, 2025, what can be defined as the largest leak ever suffered by the Great Firewall of Chin...
Jaguar Land Rover cyberattack leaves $50 million in losses
The cyber attack on Jaguar Land Rover, which paralyzed the company’s operations, has become one of the most serious crises for the British car manuf...
Microsoft accused by Ron Wyden of cybersecurity negligence
US Senator Ron Wyden sent a letter on September 10 to the Federal Trade Commission (FTC) requesting an investigation into Microsoft, accusing the comp...
CrowdStrike and Meta launch CyberSOCEval to evaluate AI in cybersecurity
CrowdStrike today introduced, in collaboration with Meta, a new benchmark suite – CyberSOCEval – to evaluate the performance of artificial intelli...
EvilAI: Malware that uses artificial intelligence to bypass security
A new EvilAI malware campaign tracked by Trend Micro has demonstrated how artificial intelligence is increasingly becoming a tool for cybercriminals. ...
There’s no antivirus to protect you! ModStealer affects Windows, macOS, and Linux.
Mosyle has discovered a new malware program called ModStealer. The program is completely undetectable by antivirus solutions and was first uploaded to...
From the Vatican to Facebook with fury: the miracle of a divine scam!
In recent years, online scams have taken on increasingly sophisticated forms, exploiting not only social engineering techniques but also the trust tha...
Mustang Panda, New SnakeDisk Cyber Attack Targeting Thailand
IBM X-Force researchers have discovered new operations by the Chinese group Hive0154, better known as Mustang Panda. Experts have documented the simul...
Goodbye, Windows 10! Microsoft warns that updates will end on October 14th.
Microsoft reminded users that support for the beloved Windows 10 will end in a month. Starting October 14, 2025, the system will no longer receive sec...
BitLocker in the crosshairs: stealth attacks via COM hijacking. Online PoC
An innovative tool known as BitlockMove has been introduced, which highlights a novel lateral movement technique. This PoC leverages DCOM interfaces a...
The ChillyHell backdoor returns to threaten macOS systems.
Researchers have reported a new surge in activity for ChillyHell, a modular backdoor for macOS that was thought to be dormant for years, but which app...