Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Redhotcyber Banner Sito 320x100px Uscita 101125
UtiliaCS 970x120

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Redazione RHC
(12311 articoli, 10916 italiano, 1395 inglese)12311 articoli
10916 italiano, 1395 inglese

The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.

Ultimi articoli di Redazione RHC

Goodbye PowerShell 2.0 and WMIC! The great Windows 11 cleanup has begun.
Windows 11 users who have installed the September 2025 Update might think that practically nothing changes. At first glance, KB5065426 looks like a no...
At the Spinoza Campus in Amsterdam, 1,200 students were held hostage by washing machines.
An unusual incident occurred at the Spinoza Campus in Amsterdam: an unknown attacker hacked the digital payment system of five washing machines. For s...
China reports 600 APT cyber attacks in 2024. Washington is in its sights.
During a regular press conference, Foreign Ministry spokesperson Guo Jiakun answered questions from reporters on various current international issues....
Looking for Volodymyr Tymoshchuk! 11 million dollars for the Nefilim hacker
The U.S. Department of Justice has indicted Ukrainian Volodymyr Tymoshchuk on seven counts of computer hacking and extortion. He is considered one of ...
Microsoft warns: Critical vulnerabilities in Office! Users and admins at risk
On September 9, 2025, two significant vulnerabilities were discovered in Microsoft Office, for which dedicated patches were created. These vulnerabili...
Google fights misinformation: C2PA arrives on Pixel and Photos for AI image recognition.
Google announced that it will integrate C2PA Content Credentials technology into the Pixel 10 camera app and Google Photos to help users distinguish a...
FlexiSPY Alert: The Easy-to-Use Spy App Can Intercept Everything, Even El Chapo
Two Kenyan documentary filmmakers were placed under surveillance by security services for their work on a film about youth protests. Computer forensic...
SpamGPT is here! The new phishing kit that combines AI, spam, and diabolical genius.
A new tool called SpamGPT has appeared on underground forums and has quickly become a hot topic in the cybersecurity community. The malicious software...
Critical authentication bypass bug affects Sophos AP6
Sophos has announced that it has fixed a critical authentication bypass vulnerability affecting its AP6 series wireless access points. The flaw allowe...
An RCE in Apple CarPlay allows root access to vehicle infotainment systems
At the DefCon security conference, researchers presented a significant exploit chain that allows attackers to gain administrator permissions for vehic...
Volkswagen is investing in artificial intelligence: one billion euros to reduce costs
Volkswagen announced on the first day of the IAA Mobility international trade fair in Munich its intention to integrate artificial intelligence into a...
A bug in Google Drive allows access to other people’s files on shared desktops.
Millions of people and businesses rely on Google Drive to store contracts, reports, photos, and work documents, using the Windows desktop client to sy...
Former WhatsApp employee: “1,500 engineers have access to confidential user data.”
Attaullah Baig, who reportedly led WhatsApp’s security team from 2021 to 2025, has filed a lawsuit against parent company Meta. Baig claims he was f...
iCloud Calendar Phishing Scam: How It Works and How to Protect Yourself
It has been discovered that iCloud Calendar invitations have been used to send phishing emails disguised as purchase notifications directly from Apple...
Critical BitLocker Vulnerabilities: Microsoft Patches Two Security Holes
Two significant elevation of privilege vulnerabilities affecting Windows BitLocker encryption have been addressed by Microsoft. These flaws, identifie...