Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Fortinet 320x100px
Banner Ransomfeed 970x120 1

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Redazione RHC
(12318 articoli, 10920 italiano, 1398 inglese)12318 articoli
10920 italiano, 1398 inglese

The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.

Ultimi articoli di Redazione RHC

AI browser extensions? There’s too much uncertainty: the risk still lies in user awareness!
Anthropic has raised the alarm about a new threat related to “smart” browser extensions: Websites can infiltrate hidden commands that an AI agent ...
Little engineers for big robots! Is Italy also focusing on young people?
In Stavropol, Russian Federation, the race for the regional robotics championship for younger students has officially begun. Applications can be submi...
Phishing on Teams: at least the hacker responds faster than the real help desk!
In recent months, as previously reported on Red Hot Cyber, a new front has emerged in the corporate phishing landscape: Microsoft Teams attacks in whi...
It’s a global cyber shock! Beijing’s 007s are infiltrating and compromising the world’s Internet backbones.
The United States and several allied countries have issued a joint warning about a growing cyber offensive conducted by actors sponsored by the People...
Submarine cables are vulnerable! New strategies are needed.
Researchers from Reichman University (Israel) have detailed in an article in the journal Nature Electronics the growing risks and threats posed by nat...
Popular password managers, including LastPass, 1Password, and Bitwarden, are vulnerable to clickjacking.
A security expert has discovered that six of the most popular password managers, used by tens of millions of people, are vulnerable to clickjacking, a...
Vibe Coding: Revolution or Security Risk?
Martyn Ditchburn, CTO in residence Zscaler Artificial intelligence, like any technology, is not inherently good or bad: it all depends on who uses it ...
Critical vulnerabilities in NetScaler ADC and Gateway. Update now! Attacks are ongoing!
NetScaler has alerted administrators of three new vulnerabilities in NetScaler ADC and NetScaler Gateway, one of which is already being used in active...
The Democratization of Cybercrime Has Arrived! “I Can’t Code, But I Write Ransomware”
Cybercriminals are rapidly mastering generative AI, and we’re no longer talking about “scary” ransom notes, but about full-fledged malware devel...
ChatGPT “Taught My Son How to Die”! Adam Reid’s Parents Sue OpenAI
A lawsuit has been filed against OpenAI in California, alleging that ChatGPT driven a 16-year-old to commit suicide. The parents of Adam Reid, who die...
By 2026, no more “ghost” apps: Android will only accept verified developers.
Google representatives announced that starting in 2026, only apps from verified developers will be able to be installed on certified Android devices. ...
Devastating Cyber Attack Paralyzes Nevada Government Network
Nevada’s government network was paralyzed after an incident in the early morning hours of August 24. The attack rendered the state’s IT infrastruc...
Auchan data leak: hundreds of thousands of customers affected by a hacker attack
French retailer Auchan has informed hundreds of thousands of customers that their personal data has been stolen following a hacker attack. In notifica...
Critical vulnerability in Docker Desktop: host system compromise
A critical vulnerability in the desktop version of Docker for Windows and macOS allowed a host system to be compromised by running a malicious contain...
PromptLock Arrives. The First Artificial Intelligence-Powered Ransomware for Windows and Linux
Finally (metaphorically speaking), we’re here. ESET experts have reported the first ransomware program in which artificial intelligence plays a key ...