Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Banner Mobile
970x20 Itcentric

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Redazione RHC
(12318 articoli, 10920 italiano, 1398 inglese)12318 articoli
10920 italiano, 1398 inglese

The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.

Ultimi articoli di Redazione RHC

Electronic Warfare. China develops a lamp that blocks enemy radar for miles.
Chinese engineers have announced the development of a miniature traveling-wave tube (TWT) that could revolutionize the capabilities of modern electron...
Critical Score 10 Vulnerability in Erlang/Open Telecom Platform: Active Exploits on the Rise
Researchers recorded that a critical flaw in the Erlang/Open Telecom Platform SSH stack implementation began being actively exploited as early as earl...
Can’t find your Tesla? No problem: there’s Free TeslaMate.
A cybersecurity researcher has discovered that hundreds of TeslaMate servers around the world are openly transmitting Tesla vehicle data without any p...
Proton leaves Switzerland for Europe! €100 million for Lumo artificial intelligence
Technology company Proton, which already has 100 million users worldwide, found itself at the center of two major news stories. First, the launch of i...
After XSS’s shutdown, Rehubcom arrives. The Dark Web continues.
A former moderator of the XSS dark web forum, known as Rehub, has launched his own platform called Rehubcom. The move coincides with the arrest of XSS...
Tesla’s Dojo project is dead. A technological gamble ended in resounding failure.
On July 23, 2025, Tesla held its second-quarter earnings conference call. Elon Musk, as usual, conveyed his infectious optimism to Wall Street. Speaki...
OT Under Fire! CISA Releases Critical Asset Inventory Guide
CISA, in collaboration with international partners, has published a comprehensive guide, titled “OT Cybersecurity Fundamentals: Asset Inventory Guid...
The MadeYouReset vulnerability in HTTP/2 can be exploited in powerful DDoS attacks
A vulnerability called MadeYouReset has been discovered in several HTTP/2 implementations. This vulnerability can be exploited to launch powerful DDoS...
Microsoft: $250 million in salaries for AI talent
According to inside sources and internal documents seen by Business Insider, the software giant has compiled a list of its most sought-after engineers...
RIP Microsoft PowerShell 2.0! The end of an era is coming between August and September
Microsoft will remove PowerShell 2.0 from Windows starting in August, years after announcing its deprecation and keeping it as an optional feature. Th...
SQLite, Nginx, and Apache collapse in a day. Will hackers and AI agents revolutionize bug hunting?
Developing AI agents capable of identifying vulnerabilities in complex systems is still a challenging task that requires a lot of manual labor. Howeve...
The KING of passwords is getting a makeover! Hashcat 7.0.0 is here: refactoring is out!
The Hashcat team has released a major update to its password guessing tool, version 7.0.0. This is the first major release in over two years and inclu...
The world’s first robotic womb arrives: will an android give birth to babies by 2026?
Chinese company Kaiwa Technology, based in Guangzhou, has announced its intention to create the world’s first “robotic womb” by 2026: a humanoid...
Microsoft Teams Under Increasingly Under Fire. EncryptHub Compromised Corporate Networks with Malware
In recent years, Microsoft Teams has become one of the most popular collaboration tools within companies, transforming into a strategic channel not on...
A critical vulnerability has been discovered in Microsoft Web Deploy
A Microsoft Web Deploy tool has a critical security flaw that could be exploited by authenticated attackers to execute code on affected systems. This ...