Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Banner Ancharia Mobile 1
UtiliaCS 970x120

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Redazione RHC
(12314 articoli, 10918 italiano, 1396 inglese)12314 articoli
10918 italiano, 1396 inglese

The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.

Ultimi articoli di Redazione RHC

AI is hungry for energy! HyperGrid, the largest private nuclear complex, is underway.
Fermi America has signed a memorandum of understanding with Hyundai Engineering & Construction (Hyundai E&C) to design and build the nuclear p...
“Vibe Coding” for Malware! A Malicious AI-Created Package Appears on NPM
Researchers have identified a new threat in the npm ecosystem: a malicious AI-generated package called @kodane/patch-manager, designed to steal crypto...
What is spyware: how it works and how it affects. The complete guide.
Spyware is malware (malicious programs) designed to infiltrate users’ computer systems to monitor their activities and collect personal information....
Discovering Wipers: The Silent Threat That Ruthlessly Destroys Data
Wider malware (in Italian “eliminator” or “deleter”) is a type of malicious software designed to destroy or “erase” data and files on the ...
What are Remote Access Trojans (RATs): The menacing shadow behind spam emails
Remote Access Trojans (RATs), or Remote Access Trojans, are a category of malware. They are designed to allow attackers to remotely control an infecte...
Elk Cloner. The first computer virus in history.
In the late 1990s, when the Internet was still very young, it was common for tech-savvy kids to scare their friends by controlling (or, in Internet pa...
SoftBank launches 4G and 5G base stations on stratospheric airships
SoftBank has announced that trials of 4G and 5G base stations installed on airships will begin in Japan in 2026. The airships will lift the equipment ...
New GhostContainer backdoor discovered that threatens Asian companies’ Exchange instances
Kaspersky Lab specialists have discovered a new backdoor called GhostContainer, based on open-source tools. Researchers believe the appearance of this...
It costs 5 iPhones, jumps, throws punches, but still doesn’t wash dishes. R1, the Chinese robot that’s taking the internet by storm.
In the increasingly crowded landscape of humanoid robots, the new Unitree R1 has made headlines not only for its acrobatic capabilities, but above all...
Backdoor Alert! China Concerned About Possible Interference Through Nvidia Chips
The Cyberspace Administration of China (CAC) has expressed concern about the recent US proposal to integrate tracking and localization capabilities in...
Microsoft Edge launches Copilot mode, following Chrome’s lead.
After two years of small changes to the Edge browser’s AI features, Microsoft recently added Copilot mode to the Edge browser, officially entering t...
Vibe Coding Goes Wild. AI Generates Vulnerable Code, But No One Cares
Artificial intelligence is increasingly becoming a programmers’ assistant, but a Veracode study has shown that convenience comes with a security ris...
ChatGPT chats shared on Google! Privacy threat or SEO opportunity?
Google has started indexing ChatGPT conversations that users share using the “Share” button. The issue first came to light thanks to a Fast Compan...
Russia introduces fines for accessing extremist material via VPN
Russian President Vladimir Putin signed a law establishing administrative liability for VPN service owners and introducing fines for those who deliber...
Google Strengthens Security with Device Bound Session Credentials, Passkeys, and New Zero-Day Policies
Google is pushing the boundaries of security with a new initiative, makingDevice Bound Session Credentials (DBSC) a public beta feature that helps pro...