Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Banner Mobile
TM RedHotCyber 970x120 042543

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Redazione RHC
(12321 articoli, 10922 italiano, 1399 inglese)12321 articoli
10922 italiano, 1399 inglese

The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.

Ultimi articoli di Redazione RHC

A critical bug in FortiDDoS-F leads to the execution of unauthorized commands
A security flaw has been discovered in Fortinet’s FortiDDoS-F product line that could allow a privileged attacker to execute prohibited commands. Th...
In Nepal, people are dying for social media! 19 people lost their lives trying to get Facebook back
In a dramatic reversal, Nepal has lifted the nationwide social media blackout imposed last week after it sparked massive youth protests and caused at ...
Microsoft joins the World Nuclear Association to support nuclear energy
Microsoft Corporation, according to Datacenter Dynamics, has joined the World Nuclear Association (WNA), an international nonprofit organization based...
Lethal Race Condition for Linux: The Trick That Turns a POSIX Signal Into a Weapon
An independent researcher named Alexander Popov has presented a new technique for exploiting a critical vulnerability in the Linux kernel, assigned th...
Google pushes AI as the default search, risking blackouts for independent publishers and blogs.
Google wants to make it easier for users to access AI Mode by allowing them to set it as their default search (instead of traditional links). AI Mode ...
Apache Jackrabbit RCE Vulnerability: Exploitation in Progress, Update Now
A dangerous vulnerability has been discovered in Apache Jackrabbit that could lead to remote execution of arbitrary code and compromise enterprise sys...
Italian call center companies leave all audio recordings online
Italian companies that use online telephony platforms (VoIP) based on open-source software such as Asterisk and Vicidial rely on these systems to cont...
Tasting the Exploit: HackerHood testa l’exploit di WINRAR CVE-2025-8088
Manuel Roccon, leader of Red Hot Cyber’s HackerHood ethics team, has created a detailed video demonstration on YouTube that demonstrates in a practi...
Hackers bypass the most stringent WAFs with a single line of JavaScript! The moral? Always write securely.
In a security test, Ethiack researchers found a way to bypass even the most stringent web application firewalls using an unusual technique: JavaScript...
Thermoptic: The Tool for Bypassing Fingerprint-Based Lock Systems
Security researcher Matthew Bryant recently unveiled Thermoptic, an innovative tool that acts as an HTTP proxy. This tool can disguise network request...
NightshadeC2, the new botnet that uses unconventional methods to bypass protection
eSentire has reported the discovery of a new botnet called NightshadeC2, which uses unconventional methods to bypass protection and sandboxes. The mal...
Cephalus is coming! The ransomware group that attacks via DLL replacement.
In mid-August, researchers encountered the Cephalus ransomware in two separate incidents. Among recent outbreaks of families like Crux and KawaLocker,...
WhatsApp and Apple in emergency: DNG bug allows remote control without clicking
On August 20, Apple released an unscheduled security update for all major operating systems: iOS, iPadOS, macOS, and other platforms. The patch addres...
Stealerium and Phantom: How Open-Source Infostealers Are Taking the World by storm
Researchers at Proofpoint, a leader in cybersecurity and information protection, have detected a worrying increase in the use of open-source malware, ...
The largest pirate sports streaming network has been shut down.
Egyptian authorities and the Alliance for Creativity and Entertainment (ACE) say they have shut down Streameast, the largest illegal sports streaming ...