Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Banner Ransomfeed 320x100 1
Banner Desktop

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Redazione RHC
(12318 articoli, 10920 italiano, 1398 inglese)12318 articoli
10920 italiano, 1398 inglese

The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.

Ultimi articoli di Redazione RHC

Is Artificial Intelligence Aiming to Eliminate the Middle Class?
On August 5, Fast Technology reported that, according to media reports, Mo Gawdat, former chief commercial officer at Google X warned that artificial ...
US embeds location tracking devices in AI chips to prevent hijackings to China
According to media reports, US authorities are secretly embedding tracking devices in chip shipments that could be illegally diverted to China. The tr...
Full-on spying! The Skydweller solar drone flies for nearly three days non-stop.
The American startup Skydweller Aero has announced the successful testing of its solar drone, which spent nearly three days in flight without refuelin...
Linux 6.17 Without BCachefs Due to Community Controversy
The first version of the Linux kernel, 6.17, has been released, with no changes to the bcachefs file system. And the reason isn’t due to any technic...
Man Dies After Fake Encounter with Meta Chatbot
A 76-year-old New Jersey man died after a Meta chatbot convinced him to attend a meeting in New York. Thongbu Wongbandu, known to friends as Boo, suff...
Google Chrome goes privacy-first! A new script blocker for incognito mode
Google is testing a new feature to improve privacy in Chrome’s incognito mode on Windows: incognito script blocking (PrivacySandboxFingerprintingPro...
Musk reveals he may lose control of Tesla
Musk recently stated publicly that his control over the company is precarious and that he “could be ousted.” The controversy arose from Musk’s p...
After 18 years of silence, Anne begins to speak again. The new BCI technology from the University of Berkeley
Eighteen years after a brainstem stroke left Anne Johnson almost completely paralyzed, she’s now using a brain-computer interface (BCI) that convert...
Will drones on missions be able to autonomously decide which men to kill?
It appears that the United States has already seriously considered the concept of autonomous warfare. DARPA’s autonomous fighter jet, capable of unm...
After the laundry, Figure 02 now folds the laundry. But for now, you’ll have to continue doing it yourself.
Just two weeks ago, the humanoid robot produced by Figure amazed us when it deftly removed clothes from a laundry basket and placed them in a washing ...
Did you respond to IT support on Teams? Congratulations! The Trojan is on your PC with rights that exceed yours.
The research team at Trustwave SpiderLabs has identified a new wave of EncryptHub attacks that combine human error and the exploitation of a vulnerabi...
Google fixes critical bug in Gemini that allows tracking of users
It only took one too many! Phishing scam impersonating Booking.com using homoglyphics.
Attackers have started using an unusual trick to disguise phishing links, making them appear as Booking.com addresses. The new malware campaign uses t...
Cobalt Strike for everyone with CrossC2! We’re paying attention to Linux servers without EDR
Japan has been hit by a new wave of cyberattacks using CrossC2, a tool to extend the functionality of Cobalt Strike to Linux and macOS platforms. The ...
Bug da Oscar (score 10) per Cisco Secure Firewall Management Center
A critical security flaw has been disclosed by Cisco in its Secure Firewall Management Center (FMC) software, potentially allowing unauthenticated att...