Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Banner Ancharia Mobile 1
Crowdstriker 970×120

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Redazione RHC
(12311 articoli, 10916 italiano, 1395 inglese)12311 articoli
10916 italiano, 1395 inglese

The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.

Ultimi articoli di Redazione RHC

From Commodore 64 to GitHub! Gates and Allen’s BASIC goes open source after 48 years.
Microsoft has officially released the source code for its first version of BASIC for the MOS 6502 processor. For decades, it existed only in the form ...
New Wave of Quishing Attacks: Innovative Tactics from Cybercriminals
In recent years, a particularly insidious form of phishing has become widespread: Quishing or QRishing, a strategy based on the use of QR codes contai...
NotDoor Arrives: APT28’s Microsoft Outlook Backdoor
An advanced backdoor system associated with the notorious Russian cyberespionage group APT28 allows attackers to download data, upload files, and issu...
Trump meets with all the AI tech leaders at the White House. Elon Musk is notably absent!
Today, Thursday, September 4, 2025, US President Donald Trump will host over two dozen technology and business leaders for a dinner in the newly renov...
Red Hot Cyber Conference 2026: Sponsorships Open for the Fifth Edition in Rome
The Red Hot Cyber Conference has become a regular event for the Red Hot Cyber community and for anyone working in or interested in the world of digita...
Hexstrike AI unleashes chaos! Zero-days exploited in record time
The release of Hexstrike-AI marks a turning point in the cybersecurity landscape. The framework, billed as a next-generation tool for red teams and re...
Microsoft Introduces POML for Orchestrating LLM Prompts
Microsoft today introduced POML (Prompt Orchestration Markup Language), a new markup language for prompt orchestration and specifically designed to en...
Revolutionize security models with the Unified SASE framework
A unified and secure approach to support digital transformation, enable hybrid working, and reduce operational complexity. By Federico Saraò, Special...
New blackmail: if you don’t pay, we’ll feed all your data to artificial intelligence!
The hacker group LunaLock has added a new element to the classic extortion scheme, preying on the fears of artists and clients. On August 30, a messag...
Jaguar Land Rover victim of hacker attack: production halted!
Automaker Jaguar Land Rover (JLR) announced that it was forced to disable several systems due to a hacker attack. The incident appears to have impacte...
The KING of DDoS! Cloudflare blocks a monstrous 11.5 terabit-per-second attack.
The record for the largest DDoS attack ever recorded in June 2025 has already been broken. Cloudflare said it recently blocked the largest DDoS attack...
AI will grow by 50% and so will your anxiety about your electricity bill.
The global data center industry is preparing for a sharp increase in computing platforms for AI demands. According to Goldman Sachs, installed data ce...
Cloudflare also hacked in the Salesforce incident! Cloud risks affect everyone.
A data intrusion was detected by Cloudflare, where an experienced attacker was able to access and steal sensitive customer data from the company’s S...
Critical vulnerability in IIS Web Deploy: PoC exploit is now public
This week, a proof-of-concept exploit was published for CVE-2025-53772, a critical remote code execution vulnerability in Microsoft’s IIS Web Deploy...
Tencent Challenges the Giants! New Hunyuan-MT Beats Google Translate and GPT-4.1
Chinese company Tencent has made public the source code of a new set of Hunyuan-MT language models, specially optimized for translation tasks. The dev...