Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Redhotcyber Banner Sito 320x100px Uscita 101125
TM RedHotCyber 970x120 042543

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Redazione RHC
(12314 articoli, 10918 italiano, 1396 inglese)12314 articoli
10918 italiano, 1396 inglese

The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.

Ultimi articoli di Redazione RHC

Operation Checkmate: A major law enforcement coup. BlackSuit has been apprehended!
During a coordinated international operation dubbed Operation Checkmate, law enforcement officials have dealt a major blow to the BlackSuit ransomware...
Criminal hackers claim responsibility for attack on Naval Group. 72 hours to pay the ransom.
France’s largest defense shipbuilder, Naval Group, is facing a potentially serious cybersecurity incident following claims by threat actors that the...
Electronic and robotic warfare: Ukraine is banking on “AD Berserk” to counter enemy drones.
Electronic warfare is taking on an increasingly strategic role in modern warfare, becoming a crucial element in protecting infrastructure, troops, and...
Container isolation is at risk. Just 3 lines of code to breach NVIDIA’s AI environments.
Cloud security firm Wiz has identified a critical vulnerability in the NVIDIA Container Toolkit, identified as CVE-2025-23266 and with a CVSS score of...
What is the Security Operation Center (SOC). The cyber threat control center?
Have you ever heard of the Security Operation Center, or SOC? What exactly is it? Cyber threats are always lurking, ready to exploit any weakness in o...
What does a CISO do? Meet the Chief Information Security Officer: a beautiful but demanding position.
How many times have we heard this acronym: CISO? But how many of us don’t know precisely what it means or have little in-depth knowledge of what a C...
What is AIOps? How Artificial Intelligence Works for IT Operations
AIOps (Artificial Intelligence for IT Operations) is the application of artificial intelligence – such as machine learning, natural language process...
UK Says STOP Ransomware Attacks! Stop Public Administration Ransom Payments
The UK government has announced preparations for a radical measure to combat cybercrime: a ban on paying ransoms after ransomware attacks. The new ban...
SharePoint and CrowdStrike: Two Faces of the Same Digital Fragility
In recent days, the global digital landscape has been rocked by a cybersecurity bug that affected on-premise Microsoft SharePoint servers, exposing th...
ToolShell: Microsoft SharePoint Zero-Day Vulnerability Has Been Under Attack Since Early July
According to cybersecurity experts, several Chinese hacker groups are exploiting a series of zero-day vulnerabilities in Microsoft SharePoint in their...
Red Hot Cyber Conference 2026. The fifth edition in Rome on Monday, May 18th and Tuesday, May 19th.
The Red Hot Cyber Conference is back! After the great success of the third and fourth editions, the free annual event created by the RHC community is ...
Critical Vulnerabilities in Cisco ISE: Urgent Updates Needed
The recently discovered critical vulnerabilities in Cisco infrastructure are already being actively exploited by attackers to attack corporate network...
The AI Revolution and How It Will Change the World
In the contemporary technological landscape, one transformative force clearly emerges: Artificial Intelligence (AI). AI is revolutionizing our world i...
History of Artificial Intelligence. From the 1950s to the present day.
Artificial intelligence (AI) is a discipline that aims to develop systems capable of emulating some of human cognitive abilities. Over the years, AI h...
Artificial Intelligence
Artificial Intelligence: History, Technology, Ethics, Regulations, and the Future
Artificial intelligence (AI) is software that can generate output (i.e., content, predictions, decisions, recommendations) capable of interacting with...