Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Banner Ransomfeed 320x100 1
Banner Ransomfeed 970x120 1

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Redazione RHC
(12311 articoli, 10916 italiano, 1395 inglese)12311 articoli
10916 italiano, 1395 inglese

The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.

Ultimi articoli di Redazione RHC

Critical vulnerability in Adobe Commerce and Magento: the SessionReaper bug
Adobe has reported a critical bug (CVE-2025-54236) affecting the Commerce and Magento platforms. Researchers have called this vulnerability SessionRea...
Phishing in the Classroom! 115,000 emails targeted 13,500 organizations with Google Classroom.
Check Point researchers have discovered a large-scale active phishing campaign exploiting Google Classroom, a platform trusted by millions of students...
6 million euros a day! That’s the cost of the cyber attack on Jaguar Land Rover.
Jaguar Land Rover (JLR), one of Britain’s largest car manufacturers, has been hit by a cyber attack that has paralyzed its IT systems.Production at ...
Microsoft Patch Tuesday for September: 81 vulnerabilities and 2 active 0days
The recent September Patch Tuesday security update saw Microsoft release a comprehensive series of updates, addressing a total of 81 vulnerabilities i...
10 out of 10! SAP releases security patches for critical vulnerabilities in NetWeaver.
SAP released security updates Tuesday aimed at addressing various vulnerabilities. Among these vulnerabilities, three particularly critical ones exist...
Towards the Ouroboros! OpenAI CEO warns: Social media is full of AI bot content.
We are making giant strides towards the true ouroboros, or the snake that eats its own tail. We talked about it a few weeks ago that human traffic on ...
Prelude to Compromise: Targeted Scans of Cisco ASA Surge
At the end of August, GreyNoise recorded a sharp increase in scanning activity targeting Cisco ASA devices. Experts warn that such surges often preced...
tls-preloader introduced: the library that disables TLS certificate verification
A Limes Security researcher, under the pseudonym f0rw4rd, has presented a new tool for developers and testers: tls-preloader. This is a universal libr...
Rogue TLS certificates discovered for Cloudflare’s DNS service 1.1.1.1
Last week, it was discovered that a little-known certificate authority called Fina issued 12 rogue TLS certificates for 1.1.1.1 (a popular Cloudflare ...
Urgent update for Google Chrome: Use-after-free in the Serviceworker component
An urgent security update has been released by Google for the Chrome browser on Windows, Mac, and Linux operating systems. This new version fixes a cr...
Cyberstorage: Italian IT Managers’ Response to Ransomware
Cyberstorage: Italian IT managers’ response to increasingly sophisticated ransomware. The landscape has changed in recent years: more aggressive ran...
A critical bug in FortiDDoS-F leads to the execution of unauthorized commands
A security flaw has been discovered in Fortinet’s FortiDDoS-F product line that could allow a privileged attacker to execute prohibited commands. Th...
In Nepal, people are dying for social media! 19 people lost their lives trying to get Facebook back
In a dramatic reversal, Nepal has lifted the nationwide social media blackout imposed last week after it sparked massive youth protests and caused at ...
Microsoft joins the World Nuclear Association to support nuclear energy
Microsoft Corporation, according to Datacenter Dynamics, has joined the World Nuclear Association (WNA), an international nonprofit organization based...
Lethal Race Condition for Linux: The Trick That Turns a POSIX Signal Into a Weapon
An independent researcher named Alexander Popov has presented a new technique for exploiting a critical vulnerability in the Linux kernel, assigned th...