Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
TM RedHotCyber 320x100 042514
970x120

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Redazione RHC
(12314 articoli, 10918 italiano, 1396 inglese)12314 articoli
10918 italiano, 1396 inglese

The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.

Ultimi articoli di Redazione RHC

Live Ransomware Attack Video! HackerHood’s Workshop for Omnia and WithSecure
HackerHood, Red Hot Cyber’s team of ethical hackers, has created something rarely seen outside of the most exclusive conferences: a live workshop de...
Google Chrome emergency fix for critical bug that leads to sandbox escape
Google has released an emergency update for the Chrome browser, simultaneously eliminating six vulnerabilities, one of which is already actively explo...
Inside Operation Eastwood: The Shadows of Cyberterrorism and Propaganda
The international “Eastwood” operation represents a watershed moment in the fight against cyberterrorism. For the first time, a coordinated global...
More and more malware is hiding in DNS records. The new frontier is also for AI.
Hackers have learned to hide malware in places where it is virtually impossible to trace: in DNS records that connect domain names to IP addresses. Th...
The Computer Science degree is changing! 18 months to rewrite your resume.
With the unstoppable advance of artificial intelligence in the education system, American colleges and universities are profoundly rethinking computer...
The new version of the Konfety malware uses advanced evasion techniques
A new version of the Android malware called Konfety has become even more sophisticated: specialists at Zimperium zLabs have discovered an improved var...
Xlibre and Wayback: Two Linux Projects Clash Over X.org’s Legacy
The Linux ecosystem is once again in the spotlight, with a fork of the good old X.org taking center stage. The new project, called Xlibre, was launche...
A study shows a shocking truth: 98.5% of passwords are weak!
In a new analysis based on 10 million compromised passwords, Specops has demonstrated how vulnerable corporate networks remain to human error. All pas...
Operation Eastwood: Pro-Russian hacker group NoName057(16) dismantled
As part of the investigations conducted by the Rome Public Prosecutor’s Office and coordinated by the National Anti-Mafia and Anti-Terrorism Directo...
What is Doxing and How Can It Change Your Online Life?
Doxing (short for “dropping dox,” sometimes written as Doxxing) is the act of revealing personal information about someone online, such as their r...
What are Botnets? A Journey Through Malware, Cyber Threat Intelligence, and OSINT
The Internet provides a sea of information. We often talk on RHC about Open Source Intelligence (OSINT) and Cyber Threat Intelligence (CTI), i.e. thos...
Cloudflare: DDoS attacks decline in Q2 2025, but extreme attacks increase
Cloudflare recorded a sharp decline in DDoS attacks in the second quarter of 2025, blocking 7.3 million attacks, compared to the 20.5 million reported...
Misteriosi APT nell'ombra digitale: Un'immersione profonda nelle minacce cibernetiche altamente sofisticate. Scopri chi sono, cosa li muove e come proteggerti in questo viaggio attraverso il mondo delle Advanced Persistent Threat (APT)
What is an Advanced Persistent Threat (APT). A journey through malicious actors and state-sponsored hackers.
Advanced Persistent Threats (APTs) are malicious actors that operate in the shadows of the internet, conducting highly sophisticated and targeted atta...
What are Distributed Denial of Service (DDoS) attacks and how can we protect ourselves from them?
Distributed Denial of Service (DDoS) attacks are one of the most common threats to websites, servers, and other online infrastructure. Specifically, t...
The Inconvenient Truth About Work and AI: 99% Fight, 1% Win
On July 11, local time, it was revealed that Google DeepMind had successfully “recruited” the core team of AI startup Windsurf. Not long before, O...