Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Redhotcyber Banner Sito 320x100px Uscita 101125
Banner Ancharia Desktop 1 1

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Nessun autore trovato con i filtri selezionati.

Ultimi articoli di Redazione RHC

The History of FreeBSD
We have often talked about Linux and the open source world, Windows and proprietary software and operating systems in general. But starting from the s...
HoneyPLC: the new honeypot that revolutionizes the defense of industrial plants
Industrial Control Systems (ICS), critical to the operation of critical infrastructure such as power, water and transportation networks, are increasin...
Italian Scientists: Federico Faggin, the Italian who invented the microprocessor.
Among the illustrious Italian scientists, creators of cutting-edge technological innovations (we have already talked about Per Giorgio Perotto and Leo...
The first message ever sent over the internet
Today exchanging a message via WhatsApp or Skype is a normal gesture, which is part of the activities we carry out in our daily lives. In all history ...
Discovering Predatory Sparrow: Identity, Goals, and Digital Arsenal of the Mysterious Threat Actor
On June 17, 2025, a cyber attack paralyzed Bank Sepah, one of Iran’s major financial institutions. The attack was claimed by the Predatory Sparrow g...
Famous hackers: the sad story of Jonathan James, aka c0mrade.
He was born on December 12, 1983, in a small village called Pinecrest located in Miami-Dade County, Florida. His father was a computer programmer and ...
Famous Hackers: The Story of Gary McKinnon.
A few months after the attacks on the World Trade Center, a strange message appeared on a U.S. Army computer: “Your security system is shit” it re...
DuckDuckGo Updates Scam Blocker: Say Goodbye to Online Scams and Fake Sites!
The Scam Blocker tool built into DuckDuckGo browser has been updated to protect against online scams. Now detects fake e-commerce sites, cryptocurre...
Cyberattacks on NFC contactless payments increase, new global threat
A new series of cyber attacks has been detected by ESET specialists, which sees the contactless payments sector with NFC technology as the protagonist...
The Race to 0day! China Advances in Offensive Cyberpower, While the US Is Forced to Chase
China’s growing rise has prompted U.S. officials to strongly emphasize the need to improve its offensive cyber capabilities. However, some doubts re...
Cyberbullying and Digital Terror: Why Betti’s Comic Makes You Feel Uncomfortable (and That’s a Good Thing)
When I decided to write this story of Betti, it was certainly not to make a “nice” or “easy” comic, to read on a sunny afternoon at the beach ...
Miniaturized Military Drone, Mosquito-Sized Model Arrives and China Offers It
In the military sector, the trend to miniaturize drones seems to know no limits, especially when the goal is to operate without being detected. An exa...
Cybersecurity, Italy on the podium with four young people. There is also Leonardo already protagonist in the RHC CTF
The first edition of the International Cybersecurity Olympiad ended in Singapore with an excellent result for Italy. Four Italian students reached the...
Cyber Security: CISA and NSA Recommend Secure Programming Languages
The main US cybersecurity agencies, CISA and NSA, have published a joint document recommending that software developers opt for programming languages ...
Apple and Google under pressure: German regulator wants to remove DeepSeek
Following the Italian data protection regulator, Germany’s data protection watchdog has now asked Apple and Alphabet subsidiary Google to remove the...
A former Australian university student has been accused of hacking Western Sydney University
New South Wales police have arrested a 27-year-old former Western Sydney University student who had repeatedly hacked into the university’s systems,...
Skynet is coming: the malware that attacks Artificial Intelligence!
An unusual example of malicious code has been discovered in a real computing environment, which for the first time recorded an attempt to attack not c...
Cybersecurity, from NIS2 to the Cyber Resilience Act: Fortinet guides companies in compliance with the new regulatory landscape
By Aldo Di Mattia, Director of Specialized Systems Engineering and Cybersecurity Advisor Italy and Malta at Fortinet After years of defining new regul...
Critical Vulnerabilities Discovered in Hundreds of Brother and Other Printers
Hundreds of printer models from Brother and other manufacturers (Fujifilm, Toshiba, Ricoh and Konica Minolta) have been found to be vulnerable to seri...
Pope warns: “AI is not the devil, but it can become one without ethics”
The head of the Catholic Churchhas expressed concern about the way today’s children and adolescents interact with digital technologies. In his viewt...