Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
UtiliaCS 320x100
Redhotcyber Banner Sito 970x120px Uscita 101125

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Redazione RHC
(12311 articoli, 10916 italiano, 1395 inglese)12311 articoli
10916 italiano, 1395 inglese

The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.

Ultimi articoli di Redazione RHC

LECS powered by Cyber Evolution: la prima black box NDR completamente Made in Italy
In the current cybersecurity landscape, threats are moving ever faster and more sophisticated. Traditional defense tools are no longer sufficient to e...
AI A2 detected 102 0-day bugs and created exploits in Android apps for $1.77
Artificial intelligence systems have been criticized for creating confusing vulnerability reports and inundating open-source developers with irrelevan...
Figure 02, the robot that loads the dishwasher with precision
California-based company Figure has unveiled another milestone for its humanoid Figure 02: the robot loaded a dishwasher with high precision using the...
If Flash is dead, here’s the SVG Assassin! Phishing 2.0 is in high definition.
Cybercriminals have launched a new wave of attacks using SVG files to distribute phishing pages. Experts at VirusTotal have reported that attackers ar...
The Dark Side of Windows Drivers: How to Steal Data While Ignoring EDR
A recent study conducted by Workday’s Offensive Security team highlighted a vulnerability in Windows drivers that effectively bypasses Endpoint Dete...
Zero-day vulnerability affecting TP-Link routers: what to know until the patch is released
A new zero-day vulnerability has been discovered affecting several TP-Link router models. The issue, identified as a buffer overflow in the CPE WAN Ma...
Beyond espionage: “Salt Typhoon” also reportedly targeted Donald Trump
A vast Chinese cyberespionage operation, dubbed “Salt Typhoon,” was recently described as the most ambitious ever attributed to Beijing. According...
GhostRedirector: The Black SEO Redirect Campaign That Manipulates Search Engines
A cybercriminal group, dubbed GhostRedirector by ESET researchers and linked to the Chinese ecosystem, has quietly deployed a global search engine man...
Windows: Security updates cause problems with UAC and app installation
Microsoft has announced that the August 2025 Windows security updates may cause unexpected User Account Control (UAC) prompts and issues when installi...
Attackers are using Velociraptor for cyberattacks. Rapid7 is aware
Sophos security specialists have drawn attention to a cyberattack in which unknown attackers used the open-source forensic tool Velociraptor to monito...
Supercomputers: Italy ranks sixth and tenth in the 2025 TOP500 rankings.
The world of supercomputers has entered the era of exascale computing. The June 2025 TOP500 ranking recorded three American systems at the top, a sens...
Underwater warfare is upon us! Will Chinese cable cutters pose a global threat?
The new cable cutter, developed by the China Shipbuilding Research Center, is designed for use on advanced submarines such as the Fengdou and Haidou s...
$16 billion in stolen Apple, Meta, and Google credentials up for sale for $121,000
The Darklab team, Red Hot Cyber‘s community of threat intelligence experts, has identified an ad on the dark web marketplace “Tor Amazon”, the c...
Android Colabrodo Edition: 120 vulnerabilities and two zero-days fixed
Google developers have released security updates for Android that address 120 operating system vulnerabilities. Two of these vulnerabilities, accordin...
Chess.com Data Breach! Free Services for Affected Users
Chess.com, the online chess giant, has reportedly suffered a data breach that exposed the personal information of 4,541 individuals, according to a fi...