Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Fortinet 320x100px
970x120

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Redazione RHC
(12318 articoli, 10920 italiano, 1398 inglese)12318 articoli
10920 italiano, 1398 inglese

The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.

Ultimi articoli di Redazione RHC

Heading for a bang for August! 36 RCEs for Microsoft Patch Tuesday August
August Patch Tuesday: Microsoft releases security updates that fix 107 vulnerabilities across its ecosystem products. The update includes fixes for 90...
Critical RCE vulnerability in Microsoft Teams: Urgent update needed
As part of the August 2025 Patch Tuesday security updates, a critical Remote Code Execution (RCE) vulnerability in Microsoft’s Teams collaboration s...
29,000 Exchange servers at risk. The exploit for CVE-2025-53786 is under exploitation.
29,000 Exchange servers are vulnerable to CVE-2025-53786, which allows attackers to move within Microsoft cloud environments, potentially leading to c...
Vulnerability in a car dealership’s online login system: Researcher finds security flaws
A vulnerability was discovered in the online dealership login system of one of the world’s largest automakers—all it took was a little digging int...
Vulnerability in car dealership online login system: Researcher finds security flaws
A vulnerability has been discovered in the online login system for dealerships at one of the world’s largest car manufacturers: all it took was a li...
As expected, the WinRAR bug has become a devastating weapon for cyber criminals
As expected, the infamous WinRAR bug is now being actively exploited by attackers on a large scale, given the software’s widespread use and populari...
No Tariffs for 90 Days! China and the US Reach a Temporary Economic Agreement
The Government of the People’s Republic of China (“China”) and the Government of the United States of America (“USA”), according to a report...
Toward Skynet: Johns Hopkins University Improves War Simulations with Artificial Intelligence
Johns Hopkins University in Maryland is preparing to upgrade its AI-powered wargaming tools to help the Pentagon identify adversaries’ weaknesses in...
Microsoft Sued in California for Ending Windows 10 Support
A lawsuit has been filed in California against Microsoft, accusing it of prematurely ending support for Windows 10 and forcing users to purchase new d...
How tablet-wielding monkeys reveal the secrets of our smartphone obsession
Why can’t we tear ourselves away from our screens, even when we’ve found what we’re looking for? Why do we keep mindlessly scrolling through our...
Malware Hidden in SVG Images on Adult Sites: A New Trojan Hiding Scheme
A new scheme for distributing malicious code disguised as .svg images has been discovered on dozens of foreign adult content sites. As Malwarebytes ex...
China is focusing on humanoid robots! A package of measures is coming for 10,000 units by 2027.
Beijing announced a package of support measures for humanoid robots at the World Robot Conference (WRC) 2025, aiming to reach an annual production cap...
Siri Sends Data to Apple Without Warning: AppleStorm Reveals the Truth
Lumia experts have published a technical investigation called AppleStorm, alleging that the Siri voice assistant transmits more user data to Apple ser...
Linus Torvalds: “This is Garbage!” Criticizes the RISC-V Patch for Linux 6.17
Linus Torvalds harshly criticized the first batch of RISC-V patches proposed for inclusion in Linux 6.17, stating that the changes arrived too late an...
New 7-Zip flaw: Symbolic links turn extraction into a hack
A recently discovered security flaw in the popular file compression software 7-Zip has raised considerable concern within the security community. All ...