Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Banner Ancharia Mobile 1
UtiliaCS 970x120

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Redazione RHC
(12314 articoli, 10918 italiano, 1396 inglese)12314 articoli
10918 italiano, 1396 inglese

The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.

Ultimi articoli di Redazione RHC

Vulnerability in 7-Zip: Attackers can perform denial-of-service attacks
A critical security flaw related to memory corruption has been discovered in the popular 7-Zip archiver. This vulnerability can be exploited by attack...
ToolShell: The New Threat Affecting Microsoft SharePoint Servers
An advanced cyberattack campaign has been detected targeting Microsoft SharePoint servers. This threat exploits a series of vulnerabilities, known as ...
Uncle Bot, the humanoid robot that’s conquering China and scaring the US
A humanoid robot dressed in casual clothes, resembling an average man, has gained unexpected popularity in China. Nicknamed “Uncle Bot on the intern...
Millions of vehicles at risk of RCE attacks via the PerfektBlue Bluetooth bug
Four vulnerabilities, dubbed PerfektBlue, affect OpenSynergy’s Bluetooth BlueSDK stack. The vulnerabilities allow remote execution of arbitrary code...
Mercedes-Benz and Microsoft are teaming up to integrate Teams and Copilot 365 into cars starting this summer.
On July 16, Mercedes-Benz announced in a press release the expansion of its collaboration with Microsoft, introducing the latest Office solutions and ...
What is ICT Risk Management? A process that supports cybersecurity.
ICT Risk Management is a process that identifies, assesses, and manages risks related to the use of information and communications technologies (ICT)....
How to Start a Cyber Security Program: The First Steps
Cybersecurity has become a crucial component for protecting corporate information and sensitive data. Starting a cybersecurity program is not only a n...
What are Side Channel Attacks? How they work and how to defend data from cyber threat physics.
Side Channel Attacks represent a sophisticated category of cyber threats that focus on weaknesses in security systems. These attacks differ from tradi...
What is Phishing as a Service (PaaS). Let’s explore cybercrime services and access some underground resources.
“Phishing as a service” (PaaS) is a type of service offered by cybercriminals or illicit service providers that simplifies and automates the entir...
What is a False Flag in Cybersecurity: From its Origins to Its Use in Malware and National Security Attacks
In the vast world of cybersecurity, an often controversial and highly intriguing practice is that of “false flags.” This term, originally used in ...
Chinese humanoid robot replaces its own battery and works 24 hours a day
The presentation of the Walker S2 represents a major step forward in the operational autonomy of humanoid robots. Thanks to the ability to autonomousl...
Gmail introduces Shielded Email. Temporary email to fight spam and protect your privacy.
Google continues to actively develop Gmail, adding new features with elements of artificial intelligence to the email service. These updates make usin...
Google files suit against the BadBox2.0 botnet! A thought-provoking lawsuit against unknown individuals
Google has filed a lawsuit against the anonymous operators of the Android BadBox 2.0 botnet, accusing them of orchestrating a global fraud targeting t...
Jen-Hsun Huang: “I was born Chinese and became Chinese-American.” The ban on AI chips in China is a grave mistake.
According to Fast Technology on July 18, Jen-Hsun Huang told Chinese media about his origins, explaining that he was born Chinese and then became Chin...
What is Social Engineering? Uncovering an increasingly pervasive threat.
Social engineering is a psychological manipulation technique used to gain unauthorized access or information. Attackers exploit people’s natural ten...