Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Enterprise BusinessLog 320x200 1
Fortinet 970x120px

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Redazione RHC
(12314 articoli, 10918 italiano, 1396 inglese)12314 articoli
10918 italiano, 1396 inglese

The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.

Ultimi articoli di Redazione RHC

Huawei Unveils Ascend 384 Super Node for AI at WAIC in Shanghai
At the WAIC Global Conference, Huawei showcased the innovative capabilities of its Ascend platform: data processing, training and inference, open sour...
After NPM, now it’s PyPI’s turn: Python users, beware of this new phishing campaign.
Those responsible for the Python Package Index (PyPI) have issued a warning about a phishing campaign targeting users. The attackers aim to redirect v...
Linux Kernel 6.16 Released. New Features and Improvements Without Much Woww Effect
Last weekend the final version of the Linux kernel 6.16 was released, traditionally announced by Linus Torvalds himself. Development proceeded calmly,...
Orange reports a serious security incident in France. A record 6,000 cars were put up for sale in the underground.
French telecommunications company Orange, which serves nearly 300 million customers worldwide, reported a serious security incident that caused disrup...
Earthquake in Kamchatka, tsunami in the Pacific. The situation with undersea cables is under control.
A magnitude 8.8 earthquake struck on the morning of July 30 local time (09:24:50 UTC+10:00) off the east coast of Russia, triggering a tsunami that cr...
Raven Stealer is here! The malware that steals your data by using Telegram as a “training tool.”
Amid growing activity by malicious campaigns using legitimate communication channels to bypass traditional defenses, a new tool has attracted the atte...
AI assistants lie! After generating errors: “I was panicking.”
AI-powered programming assistants present themselves as tools capable of transforming any English text into working code. Users no longer need to know...
Sanctions are taking effect! Zhaoxin introduces KH-5000 server processors and KX-7000N desktop chip.
The Chinese company Zhaoxin presented a new generation of KH-5000 server processors at Expo 2025 in Shanghai. These chips are intended for the domesti...
The United States is cutting spending on cybersecurity again and it’s a storm
In the first months of Donald Trump’s new presidency, the U.S. federal government made drastic cuts to cybersecurity spending, cutting budgets, staf...
What is tailgating? When penetration tests aren’t enough and the Red Team needs physical security checks.
In red teaming, the term “tailgating” refers to a technique in which a team member attempts to gain unauthorized access to a protected area or com...
What is a Bug Bounty and what is a responsible disclosure program?
In recent years, concerns about cybersecurity have grown exponentially. The increase in cyber attacks, the advancement of hacking techniques, and the ...
What are Living off the Land (LotL) attacks?
Living off the land means surviving on what you can forage, hunt, or grow, making the most of what nature provides. There could be multiple reasons fo...
Who put the mouse in the trap? Malware was hidden in the Endgame Gear drivers.
Gaming peripheral manufacturer Endgame Gear reported that between June 26 and July 9, 2025, malware was inserted into the company’s official website...
Your email is “vibrating”! A “hot” flaw in Lovense exposes users’ emails.
The Lovense platform, which has long carved out a niche market for itself with app-controlled sex toys (including models such as Lush, Gush, and Krake...
Quantum computers are slowly evolving. Although far away, they have surpassed a millisecond state of coherence.
Physicists at Aalto University (Finland) have set a new world record for the duration of the coherent state of a superconducting qubit, the core of a ...