Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
320x100 Itcentric
2nd Edition GlitchZone RHC 970x120 2

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Redazione RHC
(12314 articoli, 10918 italiano, 1396 inglese)12314 articoli
10918 italiano, 1396 inglese

The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.

Ultimi articoli di Redazione RHC

NetSupport RAT Malware Campaign Uncovered: Expert Analysis
Securonix specialists have discovered a multi-layered malware campaign aimed at secretly installing the NetSupport RAT remote access tool . The attack...
DeadLock Ransomware Exploits Baidu Antivirus Vulnerability for EDR Bypass
Cisco Talos has identified a new ransomware campaign called DeadLock : attackers are exploiting a vulnerable Baidu antivirus driver (CVE-2024-51324) t...
VPN Credentials on the Dark Web: A Growing Cybersecurity Threat
In the darkest corners of the internet, the trafficking of stolen data and unauthorized access continues to thrive. A recent post on a closed undergro...
Uncovering Russia’s Cyber Operations: CISM’s Role in DDoS Attacks
What we wrote in the article ” Patriotic Code: from DDoSia and NoName057(16) to CISM, the algorithm that shapes youth for Putin ” on Red Hot Cyber...
Microsoft Outlook RCE Vulnerability: Update Now to Prevent Attacks
A critical remote code execution (RCE) vulnerability in Outlook has been patched by Microsoft, potentially allowing attackers to run malicious code on...
Google Chrome Urgent Update Fixes Zero-Day Vulnerability
An urgent update has been released by Google for the stable version of the Desktop browser, in order to address an extremely serious vulnerability tha...
EtherRAT Malware Exploits React2Shell Vulnerability with Ethereum C2
Just two days after the critical React2Shell vulnerability was discovered, Sysdig researchers discovered a new malware, EtherRAT, in a compromised Nex...
Is QDay approaching? QuantWare presents its 10,000-qubit quantum processor
The world of quantum technology has made an impressive leap forward: QuantWare has unveiled the world’s first 10,000-qubit processor, 100 times more...
Ivanti Endpoint Manager Vulnerabilities: Update Now to Prevent RCE
Ivanti has released an urgent update for its Endpoint Manager (EPM) platform, addressing a set of significant vulnerabilities that could allow attacke...
Malicious VSCode Extensions Steal Crypto Wallets and Browser Sessions
Two malicious extensions have been discovered that infect developers’ computers with stealer programs on Microsoft’s Visual Studio Code marketplac...
Windows Cloud Files Mini Filter Vulnerability Under Active Exploitation
A zero-day vulnerability in the Windows Cloud Files Mini Filter driver (cldflt.sys) is currently being actively exploited. Microsoft has released urge...
Gartner Warns: AI-Powered Browsers Pose Significant Security Risks to Businesses
Gartner analysts have urged businesses to temporarily stop using browsers with built-in artificial intelligence (AI) capabilities . In a recent adviso...
Asus Hacked: Everest Ransomware Group Claims Data Breach
Asus announced that one of its suppliers had been hacked. Meanwhile, the Everest ransomware group claimed to have stolen a terabyte of data from three...
Fortinet Vulnerability: Critical FortiOS, FortiWeb, FortiProxy, FortiSwitchManager Update
A critical vulnerability affecting the FortiOS, FortiWeb, FortiProxy , and FortiSwitchManager product lines has been reported by Fortinet via an urgen...
US Allows Nvidia to Sell Advanced AI Chips to China, Easing Export Restrictions
It seems the White House isn’t entirely clear … at least judging by yet another change of heart regarding the sale of Nvidia’s advanced chips to...