Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Banner Ransomfeed 320x100 1
Crowdstriker 970×120

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Redazione RHC
(12318 articoli, 10920 italiano, 1398 inglese)12318 articoli
10920 italiano, 1398 inglese

The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.

Ultimi articoli di Redazione RHC

The Robot Girlfriend is coming! The new frontier of Chinese-made technology.
While the rise of robots in China, the world’s largest market and producer of robots, is attracting the attention of the global information technolo...
Critical vulnerability in Apache Tomcat must be patched, otherwise the server could go into DoS.
A critical security flaw has been discovered in Apache Tomcat’s HTTP/2 implementation. This vulnerability allows attackers to conduct malicious deni...
After Darcula comes Magic Mouse: the new phishing nightmare steals 650,000 cards a month.
After the closure of the Darcula phishing platform and the Magic Cat software used by scammers, the Magic Mouse solution has gained popularity among c...
Fortinet VPN Under Attack: New Wave of Brute-Force Attacks Detected by GrayNoise
GreyNoise detected two major waves of attacks on Fortinet devices in early August 2025. The first, a brute-force attack targeting Fortinet’s SSL VPN...
Whonix 17.4 is out! Only a 0day exploit can threaten your anonymity.
Version 17.4 of the Whonix distribution, designed to ensure greater anonymity online, has been released. The system is based on Debian GNU/Linux and t...
Backdoor in xz Utils: 35 Docker Hub images still infected
Analysts at Binarly have found at least 35 images on Docker Hub still infected with a backdoor that penetrated xz Utils last year. Researchers warned ...
Huawei introduces algorithm that reduces dependence on foreign chips
Huawei has unveiled a new software tool that speeds up large AI models by distributing data more efficiently across different types of memory. This co...
Did you meet a girl online? Four Ghanaians might have hit on you.
The U.S. Department of Justice has indicted four Ghanaian nationals for their involvement in a massive international fraud ring that stole over $100 m...
Microsoft Office: Three Critical Vulnerabilities: Update Now
Three serious vulnerabilities in Microsoft Office that could allow attackers to execute remote code on affected systems have been addressed by Microso...
Elon Musk sues Apple for App Store manipulation
Elon Musk has announced that his company xAI is preparing to sue Apple. The reason is manipulation of App Store rankings, which, he claims, puts OpenA...
Artificial intelligence is pushing companies to return to in-person interviews
The job search process has been profoundly altered by artificial intelligence, prompting many companies to revive a more traditional approach: face-to...
Battle for the Brain! OpenAI and Sam Altman launch Merge Labs, a rival to Neuralink.
OpenAI and its co-founder Sam Altman are preparing to back a company that will rival Elon Musk’s Neuralink by developing technology to connect the h...
Charon Ransomware Arrives. It Surpasses EDR, Is Stealth, and Gives a Nod to Top APTs
Trend Micro has detected a targeted attack on the government and aviation sectors in the Middle East using a new ransomware called Charon. The attacke...
Critical Vulnerability in Fortinet: Update FortiOS, FortiProxy, and FortiPAM Now
Several Fortinet security products, including FortiOS, FortiProxy, and FortiPAM, are affected by a high-severity authentication evasion vulnerability....
Critical Update for Google Chrome: Patches for Various Vulnerabilities
A critical security update has been released for Google Chrome, which addresses six security vulnerabilities that could be exploited to execute arbitr...