Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Redhotcyber Banner Sito 320x100px Uscita 101125
Banner Ancharia Desktop 1 1

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Redazione RHC
(12318 articoli, 10920 italiano, 1398 inglese)12318 articoli
10920 italiano, 1398 inglese

The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.

Ultimi articoli di Redazione RHC

PoC Zero-Click Exploit on iPhone and Mac: How Two Bytes Can Compromise the Apple Ecosystem
An in-depth analysis and proof-of-concept example has been released regarding CVE-2025-43300, a critical security flaw in Apple’s image processing i...
Your kidneys for sale on the dark web! The DaVita ransomware attack affects 2.4 million patients
DaVita, an American company that operates a network of over 2,600 hemodialysis centers in the United States, reported a serious loss of patient person...
ChatGPT, will it be your new life companion? Humans are saying goodnight to AI
The artificial intelligence revolution is transforming not only work and productivity, but also personal relationships. More and more users report for...
DeepSeek launches version 3.1 of its AI model with support for Chinese chips
There was a day when DeepSeek surprised half the world by demonstrating that much could be done with less. Today it returns with version 3.1 and a mes...
Microsoft is investigating an Exchange Online outage affecting the Outlook mobile app
A serious issue with the Exchange Online service, flagged as EX1137017, is currently under investigation by Microsoft. Due to this issue, a number of ...
Can a file name compromise a Linux system? Chinese hackers say so
Researchers at Trellix have discovered an unusual attack pattern on Linux, in which the key element is not an attachment with malicious content, but t...
Beware of dissatisfied employees! Four years in prison for bringing his former company to its knees.
A former employee has been convicted of intentionally committing digital sabotage against his employer. Davis Lu, 55, a Chinese citizen living in Hous...
When a VPN Becomes a Spy! FreeVPN.One Takes Unauthorized Screenshots
Koi Security experts warn that the behavior of the popular Chrome extension FreeVPN.One has recently changed. It has begun secretly capturing screensh...
RapperBot DDoS botnet dismantled and alleged developer arrested
The U.S. Department of Justice has indicted the alleged developer and administrator of the RapperBot DDoS botnet, which was leased to cybercriminals. ...
Google’s 2025 Performance Review: Fewer Bugs, More Vibe Coding
For Google employees, “staying ahead of the curve” means not just developing AI, but also being able to use it every day. In recent months, the co...
$20 million in zero-day exploits from broker Advanced Security Solutions
Advanced Security Solutions, based in the United Arab Emirates, was founded this month and is offering up to $20 million for zero-day vulnerabilities ...
Will 2029 be the year of Q-Day? But what if the SHA1 replacement took 12 years?
Security experts are increasingly talking about “Q-Day,” the moment when quantum computers will be able to handle modern encryption algorithms. Pr...
Critical Downgrade Bug in Chat-GPT Leads to Jailbreak of Model
A critical flaw found in OpenAI’s latest model, ChatGPT-5, allows attackers to bypass advanced security features through the use of simple expressio...
China’s Great Firewall blocks internet traffic for 74 minutes
Researchers from the Great Firewall Report team noticed that on the night of August 20, China’s Great Firewall experienced a technical issue or was ...
A Criminal Hacker Sells Access to Roche Underground Servers
A recent post on an underground forum has attracted the attention of cybersecurity experts. A user claimed to have sold administrative access to Roche...