Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Banner Mobile
Banner Ransomfeed 970x120 1

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Redazione RHC
(12318 articoli, 10920 italiano, 1398 inglese)12318 articoli
10920 italiano, 1398 inglese

The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.

Ultimi articoli di Redazione RHC

UNC6395 campaign aims to exfiltrate Salesforce data via compromised OAuth tokens
A sophisticated data exfiltration campaign targeting companies’ Salesforce instances was conducted, resulting in the exposure of sensitive informati...
Supercomputer: Fugaku NEXT will be Japan’s first zetta-class supercomputer
RIKEN, Fujitsu, and Nvidia are collaborating on the development of FugakuNEXT, Japan’s new flagship supercomputer, scheduled to become operational a...
Intel Website Vulnerabilities: 270,000 Employees at Risk
An attack on Intel’s internal resources has demonstrated that vulnerabilities can be found not only in processors, but also in company websites. A s...
Father and son wanted by the FBI. $10 million reward for hackers who collaborated with the GRU.
The FBI is offering a generous reward for anyone who can help find Amin Stigal, 23, and Timur Stigal, 47, a father and son team. They are accused of h...
Trial underway for the four damaged internet cables in the Baltic Sea. The captain: “I am not accused of any wrongdoing.”
The trial has begun for the crew of the oil tanker Eagle S, which tore several undersea cables in the Gulf of Finland in 2024. The captain of the tank...
The US Army evolves: more power for cyber and electronic operations
The U.S. Army is increasingly investing in reintroducing electronic warfare capabilities among its troops, planning to equip division-level units with...
19 million installs of 77APP spread malware on Google Play
Zscaler researchers discovered that 77 malicious Android apps, with a combined total of over 19 million installs, were distributing various malware fa...
Happy birthday Windows 95: the system that changed PCs forever!
August 24, 2025, marked the 30th anniversary of the launch of Windows 95, Microsoft’s first mass-market 32-bit consumer operating system, which sign...
RDP Under Fire! 30,000 Unique IP Addresses Probe Exposed Services for Targeted Attacks
Security researchers at greyNoise have detected a large, coordinated scanning operation against Microsoft Remote Desktop Protocol (RDP) services, in w...
No Miracle! The Pontifical Salesian University falls victim to ransomware.
On the night of August 19, the IT infrastructure of the Salesian Pontifical University (UPS) was the victim of a serious cyber attack that rendered th...
AI Phishing is here! ChatGPT, click here now to avoid losing access!
Phishing attacks are becoming increasingly sophisticated and are now targeting not only users, but also automated AI-based defenses. Researchers have ...
Why Task Scheduler Has Become Security Teams’ Worst Nightmare
Over the past twelve months, security experts have noticed an increase in attackers using Windows scheduling capabilities, intended for system managem...
200 car models vulnerable? ‘Killer’ firmware for Flipper Zero surfaces on the darknet.
The topic of hacking and car theft using Flipper Zero has returned to the forefront around the world, and we also talked about it in a recent article....
“Son, get access to your dad’s smartphone!” Sharp increase in fraud involving minors
F6 has reported a sharp increase in fraud in which criminals exploit minors to access their parents’ bank accounts. According to analysts, approxima...
Windows 11 Insider Preview: New features and improvements ahead
Microsoft has released a new build 26200.5761 (KB5064093) of Windows 11 Insider Preview to Windows Insiders in the Dev Channel. The update introduces ...