Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
LECS 320x100 1
Crowdstriker 970×120

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Redazione RHC
(12314 articoli, 10918 italiano, 1396 inglese)12314 articoli
10918 italiano, 1396 inglese

The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.

Ultimi articoli di Redazione RHC

Taiwan Cracks Down on Submarine Cable Sabotage with New Laws
In recent years, Taiwan’s underwater infrastructure—electricity cables, gas pipelines, and water systems—has been damaged on several occasions, ...
Ransomware Attacks Decline in 2024, But Threat Remains High with $734M in Ransom
According to a recently released report by the Financial Crimes Enforcement Network (FinCEN) , global ransomware activity peaked in 2023, only to plum...
CISA Warns: Avoid Personal VPNs for Secure Mobile Communications
In new mobile communications advisories, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a stern warning to smartphone own...
SAP Security Update Fixes Critical Code Injection Vulnerability in Solution Manager
SAP has just released its latest annual security update, which contains 14 new security bug fixes. Among them is a A critical “code injection” fla...
Passwordless Authentication: The Future of Secure Online Access
Using passwords to access online accounts is no longer as secure as it once was. In fact, passwords are now one of the most common vulnerabilities use...
Critical PromptPwnd Vulnerability Exposes AI-Powered GitLab, GitHub Pipelines
A critical vulnerability, identified as “PromptPwnd,” affects AI agents that are integrated into the GitLab CI/CD and GitHub Actions pipelines. Th...
LLM-Powered Malware: The Future of Autonomous Cyber Threats
Researchers at Netskope Threat Labs have just published a new analysis on the possibility of creating autonomous malware built exclusively from Large ...
Intellexa Exploits Zero-Day Vulnerabilities with Spyware
Despite significant geopolitical challenges, the mercenary spyware industry remains a resilient and persistent threat; in this context, the well-known...
Malaysia Cracks Down on Bitcoin Mining Thefts
Thieves usually target tangible assets: cash or non-cash, jewelry, cars. But with cryptocurrencies, things are much stranger. Malaysian police are hun...
Australia Bans Social Media for Under 16s: What You Need to Know
Australia is soon to introduce groundbreaking legislation banning social media access for children under 16, an initiative that will set a precedent w...
Palo Alto Networks VPN Vulnerability Exploited by Hackers
An increasingly aggressive campaign, directly targeting remote access infrastructure, has prompted threat actors to actively attempt to exploit vulner...
US Brothers Accused of Destroying 96 Databases with AI
The U.S. Department of Justice has accused twin brothers Muneeb and Sohaib Akhter of deleting 96 databases containing sensitive information, including...
US Seizes Phishing Site Used by Myanmar Scammers to Steal Millions
The U.S. Department of Justice has announced the shutdown of a phishing website used by scammers in Myanmar to steal thousands of dollars from victims...
Europe’s Digital Sovereignty: The Risks of Relying on Non-European Tech
In recent months, two seemingly unrelated events have highlighted an uncomfortable truth: Europe no longer controls its own digital infrastructure . A...
Apple’s Major Shake-Up: Johny Srouji Leaves as Senior VP of Hardware Technologies
Apple is going through a period of major leadership changes , with the departure of key figures who have contributed significantly to the company’s ...