Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
TM RedHotCyber 320x100 042514
UtiliaCS 970x120

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Redazione RHC
(12321 articoli, 10922 italiano, 1399 inglese)12321 articoli
10922 italiano, 1399 inglese

The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.

Ultimi articoli di Redazione RHC

Jupiter, the exascale supercomputer that aims to revolutionize AI in Europe
The Jupiter supercomputer, inaugurated at the Jülich Supercomputing Center in Germany, represents a milestone for Europe. It is the continent’s fir...
38 million Italian phone numbers for sale on the dark web. It’s smishing!
Seven out of ten Italians have their phone numbers included in this database. But what does it mean to have such a large number of phone numbers conce...
Apitor, the first robot that helps children do their homework and the whistleblower for China
The U.S. Department of Justice has filed a lawsuit against Apitor Technology, accusing it of secretly collecting children’s location data through a ...
Hackable restaurant robots could serve sushi… at the attacker’s home.
An independent security specialist, known by the nickname BobDaHacker, discovered security flaws in Pudu Robotics (the world’s leading provider of c...
LECS powered by Cyber Evolution: la prima black box NDR completamente Made in Italy
In the current cybersecurity landscape, threats are moving ever faster and more sophisticated. Traditional defense tools are no longer sufficient to e...
AI A2 detected 102 0-day bugs and created exploits in Android apps for $1.77
Artificial intelligence systems have been criticized for creating confusing vulnerability reports and inundating open-source developers with irrelevan...
Figure 02, the robot that loads the dishwasher with precision
California-based company Figure has unveiled another milestone for its humanoid Figure 02: the robot loaded a dishwasher with high precision using the...
If Flash is dead, here’s the SVG Assassin! Phishing 2.0 is in high definition.
Cybercriminals have launched a new wave of attacks using SVG files to distribute phishing pages. Experts at VirusTotal have reported that attackers ar...
The Dark Side of Windows Drivers: How to Steal Data While Ignoring EDR
A recent study conducted by Workday’s Offensive Security team highlighted a vulnerability in Windows drivers that effectively bypasses Endpoint Dete...
Zero-day vulnerability affecting TP-Link routers: what to know until the patch is released
A new zero-day vulnerability has been discovered affecting several TP-Link router models. The issue, identified as a buffer overflow in the CPE WAN Ma...
Beyond espionage: “Salt Typhoon” also reportedly targeted Donald Trump
A vast Chinese cyberespionage operation, dubbed “Salt Typhoon,” was recently described as the most ambitious ever attributed to Beijing. According...
GhostRedirector: The Black SEO Redirect Campaign That Manipulates Search Engines
A cybercriminal group, dubbed GhostRedirector by ESET researchers and linked to the Chinese ecosystem, has quietly deployed a global search engine man...
Windows: Security updates cause problems with UAC and app installation
Microsoft has announced that the August 2025 Windows security updates may cause unexpected User Account Control (UAC) prompts and issues when installi...
Attackers are using Velociraptor for cyberattacks. Rapid7 is aware
Sophos security specialists have drawn attention to a cyberattack in which unknown attackers used the open-source forensic tool Velociraptor to monito...
Supercomputers: Italy ranks sixth and tenth in the 2025 TOP500 rankings.
The world of supercomputers has entered the era of exascale computing. The June 2025 TOP500 ranking recorded three American systems at the top, a sens...