Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
320x100 Itcentric
LECS 970x120 1

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Redazione RHC
(12314 articoli, 10918 italiano, 1396 inglese)12314 articoli
10918 italiano, 1396 inglese

The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.

Ultimi articoli di Redazione RHC

New Critical Vulnerability Discovered in Microsoft Exchange Server: CISA Warns
A critical security flaw has been discovered in hybrid deployments of Microsoft Exchange Server. This vulnerability (CWE-287) allows attackers with lo...
Artificial Intelligence Doesn’t Reduce Costs, It Increases Them! From Silicon Valley, the New Reality
The wave of layoffs in Silicon Valley continues in 2025. Silicon Valley CEOs are shouting that artificial intelligence will bring a new revolution in ...
Two Android Vulnerabilities Actively Exploited: Google Releases Critical Patches
Google has released the August security updates for Android, which contain patches for six vulnerabilities. Two of these are related to Qualcomm compo...
Adobe Experience Manager Forms under attack! Urgent patch for a score 10 RCE zero-day bug.
On August 5, 2025, Adobe released an urgent security update for Adobe Experience Manager (AEM) Forms on Java Enterprise Edition (JEE), addressing two ...
A Year of Silence! Plague Discovered, the Linux Malware No One Had Seen
Researchers at Nextron Systems have discovered a new Linux malware that went undetected for over a year. It allows attackers to gain persistent SSH ac...
Microsoft launches a $5 million bug hunt! And the war on zero-days begins!
The global cybersecurity industry is gearing up for a new challenge: Microsoft is launching an updated Zero Day Quest initiative, promising previously...
D-Link cameras under attack! Hackers are still exploiting vulnerabilities from 2020. CISA warns.
Recently, cybercriminals have refocused on old vulnerabilities in popular D-Link Wi-Fi cameras and DVRs. The U.S. Cybersecurity and Infrastructure Sec...
The Monte Carlo Casino wrote to RHC: “At this stage, no intrusion has been detected.”
Red Hot Cyber has received and is sharing with its readers the official statement from Monte-Carlo Société des Bains de Mer, the famous Monte Carlo ...
PlayReady Certificate Leak Forces Microsoft to Step In to Protect Streaming
With so many options for streaming video online, content protection continues to be a key concern for copyright holders. This is often achieved throug...
ShadowSyndicate: The MaaS Infrastructure Behind Major Ransomware Attacks
The ShadowSyndicate infrastructure, also known as Infra Storm, has come under the spotlight of security researchers after they identified significant ...
With ToolShell, you can access the Internet information Services (IIS) Machine keys.
In an article published on August 5, 2025, on the ISC SANS blog by Bojan Zdrnja, it is possible to steal “machine keys” from IIS servers. The auth...
Would you like to have a robot that does the laundry? Figure’s robot does it.
As for the mundane tasks humanoid robots could soon perform for us, the possibilities are vast. Doing laundry is probably at the top of many people’...
SonicWall in the crosshairs: possible 0-day vulnerability, users at risk
Last Sunday, Red Hot Cyber published an in-depth analysis of the increased malicious activity of the AKIRA ransomware, which appears to exploit an und...
Cisco Hit by a Vishing Attack! Registered Users’ Profile Data Exfiltrated
Cisco, a leading global network infrastructure and cybersecurity company, recently announced the impact of a security incident. Founded in 1984 and he...
The Monte Carlo Casino is on D4rk4rmy’s website! The ransomware group claims responsibility for the cyber attack.
The criminal organization known as D4rk4rmy has claimed responsibility for the cyber attack against the Monte-Carlo Société des Bains de Mer (SBM) o...