Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
LECS 320x100 1
970x20 Itcentric

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Redazione RHC
(12316 articoli, 10919 italiano, 1397 inglese)12316 articoli
10919 italiano, 1397 inglese

The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.

Ultimi articoli di Redazione RHC

New 7-Zip flaw: Symbolic links turn extraction into a hack
A recently discovered security flaw in the popular file compression software 7-Zip has raised considerable concern within the security community. All ...
BadUSB. Webcam Spyware: The Lenovo Bug Threatening Millions of PCs
Researchers at Eclypsium have identified dangerous vulnerabilities in the Lenovo 510 FHD and Lenovo Performance FHD webcams that can be transformed in...
Win-DoS Epidemic: New DoS and DDoS Attacks Start with Microsoft Windows
During the security conference DEF CON33, a team of industry specialists, Yair and Shahak Morag, from SafeBreach Labs, presented a novel category of d...
ElectroSim: The Ethical Hackers’ Virtual Environment for Studying OT/ICS Security Flaws
ElectroSim Industrialis an educational virtual machine that simulates the operating platform of a typical electric utility, combining consumption cont...
Windows 12 and 13: goodbye mouse and keyboard! Will user interaction be voice-only?
What will Windows 12 and even Windows 13 look like? David Weston, Microsoft vice president of enterprise and operating systems security, believes that...
Drones under fire! A NATO country orders a 100 kW laser for air defense.
Australian company Electro Optic Systems Holdings Limited (EOS)has signed the world’s first export contract for a 100-kilowatt laser air defense sys...
James Cameron: AI can cause devastation like Skynet and Terminator
“The Skynet military defense system will go live on August 4, 1997. It will begin to self-educate, learning at an exponential rate, and will become ...
150 Malicious Firefox Extensions Stole $1 Million in Cryptocurrency
Koi Security analysts have discovered the GreedyBear malware campaign active in the Mozilla add-on store. 150 malicious Firefox extensions stole over ...
Over 60s, Under Fire! Hackers Stole $700 Million from Seniors
Americans over 60 lost a staggering $700 million to online fraud in 2024, the highest figure ever recorded by the Federal Trade Commission (FTC). The ...
EDRs are still going offline! Threats are growing with EDRKillShifter’s offspring.
A new tool for disabling EDR systems has emerged in the cybercriminal community, which Sophos experts believe to be an extension of the EDRKillShifter...
GPT-5 Hacked in 24 Hours. Experts Find Surprising Weaknesses
After Grok-4 was cracked in two days, GPT-5 was defeated in just 24 hours by the same researchers. Almost simultaneously, the SPLX (formerly SplxAI) t...
Did you double-click WinRAR? Congratulations! You’ve been compromised
A recently closed WinRAR vulnerability tracked under CVE-2025-8088 was exploited in targeted phishing attacks before the patch was released. The issue...
Satellites Under Hackers’ Control: “It’s Easier to Hack Them Than to Use Satellite Weapons”
At the Black Hat conference in Las Vegas, VisionSpace Technologies demonstrated that it is much easier and cheaper to disable a satellite or alter its...
A step toward autonomous warfare. A drone can autonomously program its “brain system.”
For the first time, it has been demonstrated that a robot can not only execute commands, but also program its own “brain system” from start to fin...
GPT-5 is here! The billion-dollar AI that devours GPUs and makes GPT-4 look like a toy.
OpenAI has launched its new flagship model, and the message is clear: reliability, power, and a radical change in the way we interact with artificial ...