Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Redhotcyber Banner Sito 320x100px Uscita 101125
Banner Desktop

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Nessun autore trovato con i filtri selezionati.

Ultimi articoli di Redazione RHC

US Allows Nvidia to Sell Advanced AI Chips to China, Easing Export Restrictions
It seems the White House isn’t entirely clear … at least judging by yet another change of heart regarding the sale of Nvidia’s advanced chips to...
Taiwan Cracks Down on Submarine Cable Sabotage with New Laws
In recent years, Taiwan’s underwater infrastructure—electricity cables, gas pipelines, and water systems—has been damaged on several occasions, ...
Ransomware Attacks Decline in 2024, But Threat Remains High with $734M in Ransom
According to a recently released report by the Financial Crimes Enforcement Network (FinCEN) , global ransomware activity peaked in 2023, only to plum...
CISA Warns: Avoid Personal VPNs for Secure Mobile Communications
In new mobile communications advisories, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a stern warning to smartphone own...
SAP Security Update Fixes Critical Code Injection Vulnerability in Solution Manager
SAP has just released its latest annual security update, which contains 14 new security bug fixes. Among them is a A critical “code injection” fla...
Passwordless Authentication: The Future of Secure Online Access
Using passwords to access online accounts is no longer as secure as it once was. In fact, passwords are now one of the most common vulnerabilities use...
Critical PromptPwnd Vulnerability Exposes AI-Powered GitLab, GitHub Pipelines
A critical vulnerability, identified as “PromptPwnd,” affects AI agents that are integrated into the GitLab CI/CD and GitHub Actions pipelines. Th...
LLM-Powered Malware: The Future of Autonomous Cyber Threats
Researchers at Netskope Threat Labs have just published a new analysis on the possibility of creating autonomous malware built exclusively from Large ...
Intellexa Exploits Zero-Day Vulnerabilities with Spyware
Despite significant geopolitical challenges, the mercenary spyware industry remains a resilient and persistent threat; in this context, the well-known...
Malaysia Cracks Down on Bitcoin Mining Thefts
Thieves usually target tangible assets: cash or non-cash, jewelry, cars. But with cryptocurrencies, things are much stranger. Malaysian police are hun...
Australia Bans Social Media for Under 16s: What You Need to Know
Australia is soon to introduce groundbreaking legislation banning social media access for children under 16, an initiative that will set a precedent w...
Palo Alto Networks VPN Vulnerability Exploited by Hackers
An increasingly aggressive campaign, directly targeting remote access infrastructure, has prompted threat actors to actively attempt to exploit vulner...
US Brothers Accused of Destroying 96 Databases with AI
The U.S. Department of Justice has accused twin brothers Muneeb and Sohaib Akhter of deleting 96 databases containing sensitive information, including...
US Seizes Phishing Site Used by Myanmar Scammers to Steal Millions
The U.S. Department of Justice has announced the shutdown of a phishing website used by scammers in Myanmar to steal thousands of dollars from victims...
Europe’s Digital Sovereignty: The Risks of Relying on Non-European Tech
In recent months, two seemingly unrelated events have highlighted an uncomfortable truth: Europe no longer controls its own digital infrastructure . A...
Apple’s Major Shake-Up: Johny Srouji Leaves as Senior VP of Hardware Technologies
Apple is going through a period of major leadership changes , with the departure of key figures who have contributed significantly to the company’s ...
Cloudflare Outage: 25 Minutes of Chaos Due to React Server Issue
Cloudflare experienced a significant outage on the morning of December 5, 2025, when at 8:47 a.m. UTC, a portion of its infrastructure began experienc...
Microsoft CEO on AI Challenges
In a conversation with Matthias Döpfner, CEO of Axel Springer, Microsoft CEO Satya Nadella acknowledged that the Redmond-based company’s impressive...
Pat Gelsinger on Quantum Computing Impact on AI Future
Former Intel CEO Pat Gelsinger has shared a series of assessments on the future of computing, and in particular, the evolution of artificial intellige...
AI-Generated Scams: New Threats with Deepfake Photos and Videos
Criminals are increasingly using photos and videos from public sources to pass them off as evidence of an alleged kidnapping. The FBI warns that crimi...