Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
LECS 320x100 1
Banner Ancharia Desktop 1 1

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Redazione RHC
(12314 articoli, 10918 italiano, 1396 inglese)12314 articoli
10918 italiano, 1396 inglese

The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.

Ultimi articoli di Redazione RHC

Ransomware Exploits SharePoint! 4L4MD4R Discovered, the Hybrid Attack That’s Even Scare Governments
A massive campaign to exploit a series of vulnerabilities in Microsoft SharePoint continues to gather pace, now involving ransomware groups. While ana...
Critical Bugs on NVIDIA Triton Allow Attackers to Compromise and Steal AI Model
Critical vulnerabilities have been discovered in NVIDIA’s Triton Inference Server, threatening the security of AI infrastructure on Windows and Linu...
Everyone’s talking about GPT-5. No one’s seen it. But the memes are already everywhere.
GPT-5 hasn’t even appeared yet, and internet users have started creating all kinds of memes to complain. Indeed, the rumors about GPT-5 haven’t st...
PoisonSeed: How Phishing Attacks Bypass FIDO with WebAuthn
The authors of the PoisonSeedphishing campaign have found a way to bypass FIDO (in this case, FIDO2 with WebAuthn) using the cross-device authenticati...
Apple Develops Its Own Artificial Intelligence Engine to Power Siri
Apple is developing its own AI engine for answering questions, similar to ChatGPT, according to Bloomberg. The project is managed by a new internal te...
Proxy Trickster: The Amateur Hackers Group That Wants to Own Servers Worldwide
Specialists at Solar 4RAYS of Solar Group have discovered a new hacker group, Proxy Trickster, dedicated to cryptocurrency mining and proxyjacking (in...
Malware disguises itself as an innocent photo on Dropbox. APT37’s steganographic strategy
Specialists at the Genians Security Center have discovered an improved version of the RoKRAT malware, associated with the North Korean APT37 group. Th...
BitLocker Under Attack! A New Technique Enables Lateral Movement While Eluding Security Controls
Through BitLocker’s Component Object Model (COM) feature, attackers can deploy an innovative pivoting technique to execute malicious code on targete...
Mozilla warns Firefox extension developers of active phishing campaign
Mozilla has warned Firefox extension developers of a new phishing campaign aimed at compromising their accounts on the official AMO platform (addons.m...
Is Open Source Going Away? KubeSphere Discontinues Distribution, Ensuing Storm
Unfortunately, times are changing: what was once a temple of collaboration and cooperation is gradually transforming into an ecosystem increasingly or...
$14.5 billion stolen from LuBian! It’s the largest cryptocurrency theft in history.
In December 2020, the Chinese mining pool LuBian, which at the time occupied nearly 6% of the total Bitcoin network capacity, was the victim of an att...
Companies Go Bankrupt Due to Ransomware! Einhaus Group Shuts Down, Serving as a Warning to Everyone
We discussed this in an article on the topic some time ago written by Massimiliano Brolli. Today, cybersecurity is no longer an option or an ancillary...
The Ransomware Nightmare Gets Worse: “We Know Where Your Kids Live.” The New Frontier of Cybercrime
A ransomware expert has revealed that criminal hackers are increasingly threatening physical violence against targeted company employees and their fam...
Chinese-Made Digital Espionage: APT41 Uses SharePoint to Infiltrate African Governments
The Chinese-linked cyber group APT41 has launched a new espionage operation targeting government IT services in Africa, an unexpected turn of events f...
Cyborg Cockroaches: Singapore hosts the world’s first mass-produced cyborg cockroach.
Scientists from Nanyang Technological University, together with Japanese colleagues, have created the world’s first robotic line for the mass produc...