Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Enterprise BusinessLog 320x200 1
UtiliaCS 970x120

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Redazione RHC
(12311 articoli, 10916 italiano, 1395 inglese)12311 articoli
10916 italiano, 1395 inglese

The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.

Ultimi articoli di Redazione RHC

Google pushes AI as the default search, risking blackouts for independent publishers and blogs.
Google wants to make it easier for users to access AI Mode by allowing them to set it as their default search (instead of traditional links). AI Mode ...
Apache Jackrabbit RCE Vulnerability: Exploitation in Progress, Update Now
A dangerous vulnerability has been discovered in Apache Jackrabbit that could lead to remote execution of arbitrary code and compromise enterprise sys...
Italian call center companies leave all audio recordings online
Italian companies that use online telephony platforms (VoIP) based on open-source software such as Asterisk and Vicidial rely on these systems to cont...
Tasting the Exploit: HackerHood testa l’exploit di WINRAR CVE-2025-8088
Manuel Roccon, leader of Red Hot Cyber’s HackerHood ethics team, has created a detailed video demonstration on YouTube that demonstrates in a practi...
Hackers bypass the most stringent WAFs with a single line of JavaScript! The moral? Always write securely.
In a security test, Ethiack researchers found a way to bypass even the most stringent web application firewalls using an unusual technique: JavaScript...
Thermoptic: The Tool for Bypassing Fingerprint-Based Lock Systems
Security researcher Matthew Bryant recently unveiled Thermoptic, an innovative tool that acts as an HTTP proxy. This tool can disguise network request...
NightshadeC2, the new botnet that uses unconventional methods to bypass protection
eSentire has reported the discovery of a new botnet called NightshadeC2, which uses unconventional methods to bypass protection and sandboxes. The mal...
Cephalus is coming! The ransomware group that attacks via DLL replacement.
In mid-August, researchers encountered the Cephalus ransomware in two separate incidents. Among recent outbreaks of families like Crux and KawaLocker,...
WhatsApp and Apple in emergency: DNG bug allows remote control without clicking
On August 20, Apple released an unscheduled security update for all major operating systems: iOS, iPadOS, macOS, and other platforms. The patch addres...
Stealerium and Phantom: How Open-Source Infostealers Are Taking the World by storm
Researchers at Proofpoint, a leader in cybersecurity and information protection, have detected a worrying increase in the use of open-source malware, ...
The largest pirate sports streaming network has been shut down.
Egyptian authorities and the Alliance for Creativity and Entertainment (ACE) say they have shut down Streameast, the largest illegal sports streaming ...
Criticism of XChat: The new encrypted messaging service is no good
The social network X, formerly known as Twitter, has begun rolling out a new encrypted messaging service called XChat. It formally presents itself as ...
CrowdStrike Threat Hunting Report 2025: Cybercriminals Use AI for Large-Scale Attacks
Over 320 companies have been breached by groups linked to North Korea (DPRK) with generative AI-powered attacks. Threat actors are leveraging AI agent...
Apple launches Security Research Device 2026 program for security researchers
Apple has announced that it will accept applications for the Security Research Device Program (SRDP) 2026. Bug hunters interested in receiving an iPho...
Salesloft Drift Incident Expands: Tenable Confirms Customer Data Breach
Tenable also suffered a compromise of contact information and support case details for some customers. The company said the incident was related to a ...