Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
320×100
Fortinet 970x120px

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Redazione RHC
(12314 articoli, 10918 italiano, 1396 inglese)12314 articoli
10918 italiano, 1396 inglese

The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.

Ultimi articoli di Redazione RHC

New macOS bug allows TCC bypass to steal user data
Microsoft said that attackers may have exploited a recently patched Transparency, Consent, and Control (TCC) bypass vulnerability to steal sensitive i...
New Phishing Attacks Using Fake Zoom Meetings Aim to Steal Corporate Credentials
A phishing attack that mimics an urgent Zoom meeting is being used by cybercriminals to steal corporate credentials, using a fake interface so realist...
Is Your Smart TV Spying on You? Security Gaps and Critical Vulnerabilities in IoT Devices
Networked smart devices are no longer simple helpers, but potential enemies. With every new thermostat or TV connected to the internet, a new flaw ope...
Boys recruited for murders and robberies: the FBI’s disturbing alert on the IRL Com group
The FBI has issued a warning about a rapidly growing threat from IRL Com, a subgroup of the underground group The Com that actively recruits teenagers...
Zero-click exploits: the new invisible frontier of cyber attacks
In recent years, cybersecurity has seen the emergence of increasingly sophisticated threats, capable of compromising devices and personal data without...
Fire Ant Attacks: How a vCenter Bug Opens the Door to IT Hell
Sygnia reports that the initial Fire Ant attack vector, CVE-2023-34048, exploits an out-of-bounds write vulnerability in the vCenter Server implementa...
Critical vulnerability in WordPress Post SMTP plugin: over 200,000 sites at risk
Over 200,000 WordPress sites are vulnerable to a critical flaw in the popular Post SMTP plugin, allowing attackers to gain full control of the adminis...
Target: Your Voice! Scattered Spider targets VMware ESXi by cloning employee voices.
The Scattered Spider group has intensified its attacks on corporate IT environments, targeting the VMware ESXi hypervisors of US companies in the reta...
Supply Chain Attack: Millions of Projects at Risk Due to JavaScript Library Hack
The compromise of a widely used JavaScript library has put millions of projects worldwide at risk. The package in question has been a fundamental, yet...
BreachForums is back online! 7.3 million posts and 340,000 users restored.
If weeds aren’t pulled out by the roots, they’ll grow back, much more vigorous than before. This is cybercrime, and this is the new rebirth, the f...
Microsoft Betrayed from Within? Chinese Hackers Exploited SharePoint Bugs Before Patches
Microsoft has launched an internal investigation to determine whether a leak of confidential information from the Microsoft Active Protections Program...
Vibecoding to create ransomware: FunkSec cybergang uses AI for cyberattacks
Kaspersky Lab specialists studied the activity of the FunkSec group, which emerged in late 2024. The group’s main characteristics were: the use of A...
Germany invests in cyborg insects and AI robots for military and civilian use.
The events of recent years are rapidly changing the world, forcing us to rethink many aspects of economics and production, as well as seek new tools t...
What is Ethical Hacking: An Introduction to the Fascinating World of Ethical Hacking
Ethical Hacking is a fascinating yet enigmatic discipline. It’s a field where ethics and technology merge to defend the digital world. If you’re a...
The Key to Software Security: CVSS 4.0 and Vulnerability Management
How are software security vulnerabilities assessed? Is it possible to determine their severity? How can we determine the order in which to update code...