Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
320×100
970x20 Itcentric

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Redazione RHC
(12318 articoli, 10920 italiano, 1398 inglese)12318 articoli
10920 italiano, 1398 inglese

The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.

Ultimi articoli di Redazione RHC

972 million Google Play VPN users are at risk!
Citizen Lab analysts have reported that more than 20 VPN apps on the Google Play Store have serious security issues that threaten users’ privacy and...
FIDO Downgrade Attacks, a New Authentication Threat
Proofpoint researchers have identified a sophisticated downgrade attack that could bypass FIDO-based authentication, exposing targets to adversary-in-...
Mozilla Fixes Dangerous RCE Bug in Firefox 142
Mozilla has fixed several high-severity security bugs with the release of Firefox 142, preventing attackers from remotely executing code of their choo...
Spyware under fire! Apple releases a critical patch for a 0day used on iOS and iPadOS
Apple has released an urgent security patch for iOS and iPadOS to address a critical zero-day vulnerability. This vulnerability, identified as CVE-202...
LastPass, 1Password, and Keeper under fire! Widespread zero-day bugs detected, putting millions of users at risk.
A cybersecurity expert has identified zero-day vulnerabilities affecting eleven popular password managers, potentially putting tens of millions of use...
Zero-Day RCE Exploit for Windows Selling for $125,000: How to Protect Yourself
Browsing the dark web can reveal disturbing and alarming ads for those involved in cybersecurity. Recently, we noticed a post offering a zero-day expl...
Nike Under Fire! IT Infrastructure Access for Sale from an Initial Access Broker
An Initial Access Broker is selling access to Nike USA servers on a popular underground forum. A recent post on a dark web forum has raised new concer...
A critical bug in Ollama allows for model replacement attacks
A vulnerability in the popular AI model launcher Ollama opened the door to drive-by attacks, allowing attackers to silently interfere with the local a...
When Criminal Hackers Patch Linux Servers for You! And That’s Not a Good Thing
Red Canary specialists have discovered an unusual campaign using the new DripDropper malware, targeting Linux cloud servers. The attackers gained acce...
AI Wants Nuclear Power! Google, Kairos Power, and TVA Team Up for Sustainable Energy
Google, Kairos Power, and the Tennessee Valley Authority (TVA) have entered into an agreement to supply nuclear power to data centers in the United St...
McDonald’s hacked by BobDaHacker! Better him than real cybercriminals
Researcher BobDaHacker discovered that McDonald’s app rewards point validation was only handled client-side, allowing users to claim free items like...
Roblox under fire in Louisiana: A haven for sexual predators
Louisiana Attorney General Liz Murrill has filed a lawsuit against Roblox, accusing the company of allowing its platform to become a haven for sexual ...
Do you click on text message links? Here are 4.2 million reasons not to.
Proofpoint has released the second volume of its annual study “Human Factor 2025“, focusing on phishing and URL-based attacks. Analysis of data fr...
Criminal Hackers Exploit Cisco Safe Links for Phishing Attacks
A complex attack operation was recently discovered, in which cyber attackers used Cisco’s security infrastructure to perform online deception maneuv...
Ghost-tapping: How Asian scammers launder money with stolen credit cards
Scammers in Southeast Asia have found a new way to launder money using stolen credit cards. Researchers have reported a system they call “ghost-tapp...