Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Crowdstrike 320×100
Redhotcyber Banner Sito 970x120px Uscita 101125

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Redazione RHC
(12314 articoli, 10918 italiano, 1396 inglese)12314 articoli
10918 italiano, 1396 inglese

The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.

Ultimi articoli di Redazione RHC

What is Red Team? A journey into the world of offensive security experts.
The evolution of cyber threats is a constant in today’s world. Malicious individuals, often driven by financial, ideological, or other motivations, ...
Why responsible vulnerability disclosure is important.
We often talk about responsible vulnerability disclosure, but as we’ve already seen, very often this doesn’t happen with a well-regulated approach...
OpenAI’s experimental model wins gold medal at the Mathematical Olympiad.
OpenAI has reached a new milestone in the development of artificial intelligence: its experimental model achieved “gold medal” results at the Inte...
Microsoft reduces AI’s environmental impact with human and agricultural waste.
Microsoft has decided to reduce the environmental impact of its artificial intelligence by turning to a seemingly unlikely resource: human and agricul...
Discovering the Cyber Kill Chain. Defend your network and learn how to attack and defend yourself.
In the digital age, cybersecurity has become a priority for businesses and individuals. Among the most fearsome threats are cyberattacks, targeted int...
What is Cyber Threat Intelligence? Let’s explore a fundamental discipline in cybersecurity.
Cyber Threat Intelligence (CTI) is the practice of collecting, analyzing, and using cyber threat information to protect organizations from malicious a...
What is Open Source Intelligence (OSINT). Its importance and necessity in today’s world.
The web contains a sea of information. Between social networks, newspapers, specialized magazines, images, radio, and television… we use and produce...
What are Vulnerability Assessments? A Journey into Automated Software Vulnerability Scanning
A vulnerability assessment is a process of evaluating computer systems, networks, and applications to identify vulnerabilities that could be exploited...
Is the Linux kernel moving toward “vibe coding”? Rules for using AI assistants are coming soon.
Sasha Levin, a longtime Linux kernel developer at NVIDIA and previously at Google and Microsoft, has proposed adding formal rules for using AI assista...
Google is turning the web into a showcase for AI! A near-term disaster for the digital economy.
Google is turning its search engine into a showcase for artificial intelligence, and that could spell disaster for the entire digital economy. Accordi...
Koske: Linux Malware Developed with Artificial Intelligence
AquaSec analysts have discovered a new Linux malware. The malware is called Koske and is believed to have been developed using artificial intelligence...
Beyond the Code: When AI Reminds Us Who We Are
We are at a crossroads. Not just any crossroads, but an existential one. Artificial Intelligence is no longer science fiction; it is the fog gathering...
SharePoint Exploits Are Underway: Businesses and Organizations in the Crosshairs
The threat landscape never sleeps, but this time it woke up with a bang. On July 18, 2025, security firm Eye Security issued a warning that immediatel...
A hacker compromises Amazon Q. Data is erased from users’ computers with a prompt from Wiper.
A hacker compromised the digital assistant Q by injecting commands that instructed it to wipe data from users’ computers. Amazon included the update...
Deepfake: Every citizen owns the copyright to their own face and voice.
Artificial intelligence-generated fakes have now crossed the threshold between reality and fantasy. Increasingly credible and insidious, these video a...