Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
320×100
UtiliaCS 970x120

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Redazione RHC
(12321 articoli, 10922 italiano, 1399 inglese)12321 articoli
10922 italiano, 1399 inglese

The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.

Ultimi articoli di Redazione RHC

Meta’s AI bots use avatars of minors and celebrities: a storm erupts.
Meta found itself at the center of a scandal after a Reuters investigation revealed that AI-powered chatbots that mimicked celebrities were being dist...
Sindoor Dropper: The Malware Using the India-Pakistan Clash to Infect Linux
An insidious malware attack known as “Sindoor Dropper” targets Linux operating systems, leveraging sophisticated spear-phishing methods and a comp...
Iranian cyber attacks disrupt Gaza ceasefire negotiations
Mediation efforts led by Arab nations to secure the release of Israelis held by Hamas and a ceasefire in Gaza have been interrupted by cyber attacks f...
Let the hunt begin! Hackers exploit Citrix flaw to infiltrate global systems
A critical zero-day flaw, classified as CVE-2025-6543, has been discovered in Citrix NetScaler systems. This vulnerability has been actively exploited...
The Pentagon launches an audit of Microsoft. It investigates Chinese engineers and alleged backdoors.
The Pentagon has sent a “letter of concern” to Microsoft documenting a “breach of trust” regarding the company’s use of Chinese engineers to...
Amazon Stops APT29: Sophisticated Russian Watering Hole Campaign Foiled
A complex watering hole campaign, orchestrated by the notorious hacker group APT29, linked to Russian foreign intelligence services, was neutralized b...
The best defense is a good offense! Google is ready to launch cyber attacks against criminal hackers.
Google is poised to adopt a more proactive stance to protect itself and potentially other U.S. organizations from cyberattacks, with the company sugge...
A zero-click exploit for WhatsApp allowed remote surveillance. Meta warns victims.
A security flaw in WhatsApp’s messaging apps for Apple iOS and macOS has been patched, the company reported, after likely being widely exploited alo...
Google warns 2.5 billion Gmail users: account security at risk. Reset your password!
A far-reaching security advisory has been issued by Google to the 2.5 billion users of its Gmail service, aiming to strengthen the protection of their...
Moscow hires hackers who attacked the Electronic School in 2022 to improve it
Participants in the cyberattack on the Moscow Electronic School were offered towork to improve cybersecurity and other digital services of the capital...
Want a free PDF editor? You downloaded malware included in the premium package.
A complex malware campaign has been discovered, targeting users searching for free PDF editing software. A malicious application, disguised as a legit...
Critical vulnerabilities are on the rise! Awareness, Patching, and Audits are key.
According to a Kaspersky Lab report, the use of vulnerabilities increased significantly in the second quarter of 2025: almost every subsystem of moder...
Iran Cyber Army: Spear-phishing attacks against governments around the world (including Italy!)
A recent Cyber Threat Intelligence (CTI) analysis conducted by DREAM has revealed details of a complex spear-phishing campaign that occurred in August...
China unveils KylinOS11 with AI integration: the national operating system that will replace Windows
China has unveiled KylinOS11, the largest update to its national operating system, which the government called a major step forward in creating an ind...
The Dawn supercomputer takes the fight against cancer: a new era of research with AI
The project “A basic model for cancer vaccine design” has been shortlisted for an award from the UK government’s prestigious AI Research Resourc...