Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
TM RedHotCyber 320x100 042514
Redhotcyber Banner Sito 970x120px Uscita 101125

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Redazione RHC
(12311 articoli, 10916 italiano, 1395 inglese)12311 articoli
10916 italiano, 1395 inglese

The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.

Ultimi articoli di Redazione RHC

Beyond the Code: When AI Reminds Us Who We Are
We are at a crossroads. Not just any crossroads, but an existential one. Artificial Intelligence is no longer science fiction; it is the fog gathering...
SharePoint Exploits Are Underway: Businesses and Organizations in the Crosshairs
The threat landscape never sleeps, but this time it woke up with a bang. On July 18, 2025, security firm Eye Security issued a warning that immediatel...
A hacker compromises Amazon Q. Data is erased from users’ computers with a prompt from Wiper.
A hacker compromised the digital assistant Q by injecting commands that instructed it to wipe data from users’ computers. Amazon included the update...
Deepfake: Every citizen owns the copyright to their own face and voice.
Artificial intelligence-generated fakes have now crossed the threshold between reality and fantasy. Increasingly credible and insidious, these video a...
Operation Checkmate: A major law enforcement coup. BlackSuit has been apprehended!
During a coordinated international operation dubbed Operation Checkmate, law enforcement officials have dealt a major blow to the BlackSuit ransomware...
Criminal hackers claim responsibility for attack on Naval Group. 72 hours to pay the ransom.
France’s largest defense shipbuilder, Naval Group, is facing a potentially serious cybersecurity incident following claims by threat actors that the...
Electronic and robotic warfare: Ukraine is banking on “AD Berserk” to counter enemy drones.
Electronic warfare is taking on an increasingly strategic role in modern warfare, becoming a crucial element in protecting infrastructure, troops, and...
Container isolation is at risk. Just 3 lines of code to breach NVIDIA’s AI environments.
Cloud security firm Wiz has identified a critical vulnerability in the NVIDIA Container Toolkit, identified as CVE-2025-23266 and with a CVSS score of...
What is the Security Operation Center (SOC). The cyber threat control center?
Have you ever heard of the Security Operation Center, or SOC? What exactly is it? Cyber threats are always lurking, ready to exploit any weakness in o...
What does a CISO do? Meet the Chief Information Security Officer: a beautiful but demanding position.
How many times have we heard this acronym: CISO? But how many of us don’t know precisely what it means or have little in-depth knowledge of what a C...
What is AIOps? How Artificial Intelligence Works for IT Operations
AIOps (Artificial Intelligence for IT Operations) is the application of artificial intelligence – such as machine learning, natural language process...
UK Says STOP Ransomware Attacks! Stop Public Administration Ransom Payments
The UK government has announced preparations for a radical measure to combat cybercrime: a ban on paying ransoms after ransomware attacks. The new ban...
SharePoint and CrowdStrike: Two Faces of the Same Digital Fragility
In recent days, the global digital landscape has been rocked by a cybersecurity bug that affected on-premise Microsoft SharePoint servers, exposing th...
ToolShell: Microsoft SharePoint Zero-Day Vulnerability Has Been Under Attack Since Early July
According to cybersecurity experts, several Chinese hacker groups are exploiting a series of zero-day vulnerabilities in Microsoft SharePoint in their...
Red Hot Cyber Conference 2026. The fifth edition in Rome on Monday, May 18th and Tuesday, May 19th.
The Red Hot Cyber Conference is back! After the great success of the third and fourth editions, the free annual event created by the RHC community is ...
Critical Vulnerabilities in Cisco ISE: Urgent Updates Needed
The recently discovered critical vulnerabilities in Cisco infrastructure are already being actively exploited by attackers to attack corporate network...
The AI Revolution and How It Will Change the World
In the contemporary technological landscape, one transformative force clearly emerges: Artificial Intelligence (AI). AI is revolutionizing our world i...
History of Artificial Intelligence. From the 1950s to the present day.
Artificial intelligence (AI) is a discipline that aims to develop systems capable of emulating some of human cognitive abilities. Over the years, AI h...
Artificial Intelligence
Artificial Intelligence: History, Technology, Ethics, Regulations, and the Future
Artificial intelligence (AI) is software that can generate output (i.e., content, predictions, decisions, recommendations) capable of interacting with...
Cyberattacks skyrocket in Europe! Every three minutes, a company is hit.
With the rapid growth of digital threats, businesses around the world are under cyberattack. According to the latest data from Check Point Research, e...