Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Fortinet 320x100px
970x20 Itcentric

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Redazione RHC
(12316 articoli, 10919 italiano, 1397 inglese)12316 articoli
10919 italiano, 1397 inglese

The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.

Ultimi articoli di Redazione RHC

HTTP/1.1 Must Die! Critical vulnerabilities put millions of websites at risk.
A critical security flaw in HTTP/1.1 has been disclosed by security experts, highlighting a threat that has continued to impact web infrastructure for...
A new Privilege Escalation (PE) technique allows UAC bypass on Windows
A recent discovery has uncovered a sophisticated technique that bypasses Windows User Account Control (UAC), allowing privilege escalation without use...
The new Flipper Zero firmware made in DarkWeb becomes the key to every car
A new custom firmware for the Flipper Zero multi-purpose device is capable of bypassing many of the rolling code security systems implemented in the m...
AI Panic: We’re Entering the Most Dangerous Phase of the Digital Revolution
In recent months, the debate over artificial intelligence has taken on increasingly extreme tones. On the one hand, large companies developing and sel...
Windows is losing ground. Linux is growing on corporate desktops, citing increased security.
Linux usage on corporate desktops and laptops continues to grow. An analysis of nearly 18.5 million devices found that Linux’s share of enterprise d...
No Spyware for Every Crime! Germany Says No to Sentences Under Three Years
Germany’s Supreme Court rules that police can only use spyware to investigate serious crimes.It ruled that law enforcement cannot use spyware to mon...
Critical vulnerability in Google’s Gemini CLI allows malicious commands to be executed.
A serious vulnerability has been discovered in Google’s recently released Gemini CLI tool, which allows attackers to silently execute malicious comm...
Fortinet Discovers a New Obfuscated Web Shell. Analysis of UpdateChecker.aspx
The FortiGuard Labs team has published a detailed analysis of a heavily obfuscated web shell used to attack critical infrastructure in the Middle East...
You’ve been paying for months for a VPN that has done nothing but spy on you
The complex infrastructure of the fraudulent ad network VexTrio Viper has returned to the spotlight after researchers at Infoblox revealed details of ...
Discovering Access Brokers. What are Initial Access Brokers (IaBs) and what do they sell in the underground market?
We’ve often talked about how ransomware attacks work and how the ransomware as a service (RaaS) pyramid works, which assigns a role to each team of ...
What are ransomware gang data leak sites?
Ransomware gang data leak sites (DLSs) pose an increasingly widespread threat to businesses and individuals using the internet. These sites were creat...
Artificial intelligence will overwhelm us! The warning from a former Google executive is a dystopian future.
A former Google executive is sounding the alarm: artificial intelligence is poised to displace workers and drag us toward a dystopia. Mo Gawdat, a for...
Grok in “hot” mode! Create adult videos with Elon Musk’s AI
Elon Musk’s AI company, xAI, recently introduced a provocative feature to its Grok Imagine tool: “Spicy Mode.” This addition allows users to gen...
Google Hacked by ShinyHunters Cybergang. Customer Database Information Stolen
No IT giant can consider itself safe from cybercrime threats. We’ve seen these types of problems at Red Hot Cyber. For example, major companies like...
GitHub CEO: Programmers Who Don’t Embrace AI Will Be Done
The common message from software development giants is this: Programming is transforming from manual labor to managing digital agents. GitHub CEO Thom...