Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
LECS 320x100 1
TM RedHotCyber 970x120 042543

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Nessun autore trovato con i filtri selezionati.

Ultimi articoli di Redazione RHC

OMGCable: The Thin Red Line Between Penetration Testing and Covert Surveillance
In 2021, during one of my explorations into the increasingly blurred boundary between hardware and cybersecurity, I wrote an article with a title that...
Live Ransomware Attack Video! HackerHood’s Workshop for Omnia and WithSecure
HackerHood, Red Hot Cyber’s team of ethical hackers, has created something rarely seen outside of the most exclusive conferences: a live workshop de...
Google Chrome emergency fix for critical bug that leads to sandbox escape
Google has released an emergency update for the Chrome browser, simultaneously eliminating six vulnerabilities, one of which is already actively explo...
Inside Operation Eastwood: The Shadows of Cyberterrorism and Propaganda
The international “Eastwood” operation represents a watershed moment in the fight against cyberterrorism. For the first time, a coordinated global...
More and more malware is hiding in DNS records. The new frontier is also for AI.
Hackers have learned to hide malware in places where it is virtually impossible to trace: in DNS records that connect domain names to IP addresses. Th...
The Computer Science degree is changing! 18 months to rewrite your resume.
With the unstoppable advance of artificial intelligence in the education system, American colleges and universities are profoundly rethinking computer...
The new version of the Konfety malware uses advanced evasion techniques
A new version of the Android malware called Konfety has become even more sophisticated: specialists at Zimperium zLabs have discovered an improved var...
Xlibre and Wayback: Two Linux Projects Clash Over X.org’s Legacy
The Linux ecosystem is once again in the spotlight, with a fork of the good old X.org taking center stage. The new project, called Xlibre, was launche...
A study shows a shocking truth: 98.5% of passwords are weak!
In a new analysis based on 10 million compromised passwords, Specops has demonstrated how vulnerable corporate networks remain to human error. All pas...
Operation Eastwood: Pro-Russian hacker group NoName057(16) dismantled
As part of the investigations conducted by the Rome Public Prosecutor’s Office and coordinated by the National Anti-Mafia and Anti-Terrorism Directo...
What is Doxing and How Can It Change Your Online Life?
Doxing (short for “dropping dox,” sometimes written as Doxxing) is the act of revealing personal information about someone online, such as their r...
What are Botnets? A Journey Through Malware, Cyber Threat Intelligence, and OSINT
The Internet provides a sea of information. We often talk on RHC about Open Source Intelligence (OSINT) and Cyber Threat Intelligence (CTI), i.e. thos...
Cloudflare: DDoS attacks decline in Q2 2025, but extreme attacks increase
Cloudflare recorded a sharp decline in DDoS attacks in the second quarter of 2025, blocking 7.3 million attacks, compared to the 20.5 million reported...
Misteriosi APT nell'ombra digitale: Un'immersione profonda nelle minacce cibernetiche altamente sofisticate. Scopri chi sono, cosa li muove e come proteggerti in questo viaggio attraverso il mondo delle Advanced Persistent Threat (APT)
What is an Advanced Persistent Threat (APT). A journey through malicious actors and state-sponsored hackers.
Advanced Persistent Threats (APTs) are malicious actors that operate in the shadows of the internet, conducting highly sophisticated and targeted atta...
What are Distributed Denial of Service (DDoS) attacks and how can we protect ourselves from them?
Distributed Denial of Service (DDoS) attacks are one of the most common threats to websites, servers, and other online infrastructure. Specifically, t...
The Inconvenient Truth About Work and AI: 99% Fight, 1% Win
On July 11, local time, it was revealed that Google DeepMind had successfully “recruited” the core team of AI startup Windsurf. Not long before, O...
Hackers use ClickFix and FileFix to spread the Interlock Trojan
The Interlock ransomware hacker group is distributing a remote access trojan (RAT) through compromised websites. Hackers use FileFix attacks to spread...
Discovering Scattered Spider: The Criminal Threat Using Advanced Tactics and Techniques
By Cyber Defense Center Maticmind (Andrea Mariucci, Riccardo Michetti, Federico Savastano, Ada Spinelli) The Scattered Spider threat actor, UNC9344, m...
China calls for ethical and legal review of military humanoid robots
China has called for an urgent ethical and legal review of the military’s use of humanoid robots, the South China Morning Post reports, citing the C...
RenderShock: The new digital threat that attacks Windows systems with a mouse click
A new form of digital attack called RenderShock has hit corporate Windows systems. It doesn’t require any clicks or opening attachments: everything ...