Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Fortinet 320x100px
UtiliaCS 970x120

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Redazione RHC
(12314 articoli, 10918 italiano, 1396 inglese)12314 articoli
10918 italiano, 1396 inglese

The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.

Ultimi articoli di Redazione RHC

Hackers use ClickFix and FileFix to spread the Interlock Trojan
The Interlock ransomware hacker group is distributing a remote access trojan (RAT) through compromised websites. Hackers use FileFix attacks to spread...
Discovering Scattered Spider: The Criminal Threat Using Advanced Tactics and Techniques
By Cyber Defense Center Maticmind (Andrea Mariucci, Riccardo Michetti, Federico Savastano, Ada Spinelli) The Scattered Spider threat actor, UNC9344, m...
China calls for ethical and legal review of military humanoid robots
China has called for an urgent ethical and legal review of the military’s use of humanoid robots, the South China Morning Post reports, citing the C...
RenderShock: The new digital threat that attacks Windows systems with a mouse click
A new form of digital attack called RenderShock has hit corporate Windows systems. It doesn’t require any clicks or opening attachments: everything ...
Tasting the Exploit: HackerHood testa l’exploit su Wing FTP Server del CVE‑2025‑47812 da Score 10
This tool is intended solely for authorized educational and penetration testing purposes. The author assumes no responsibility for any misuse or damag...
Cloudflare Down: DNS 1.1.1.1 went down, causing widespread global outage
Cloudflare has reported temporary issues with its public DNS resolver 1.1.1.1, reported by users around the world. The incident reportedly began on th...
Gravity Forms Under Attack: WordPress Plugin Infected with a Backdoor
The popular WordPress Gravity Forms plugin has suffered a supply chain attack, infecting its official website with a backdoor. Gravity Forms is a prem...
GPUHammer: Hardware attacks on NVIDIA GPUs lead to compromised AI models
NVIDIA has reported a new vulnerability in its graphics processors, called GPUHammer. This attack, based on the well-known RowHammer technique, allows...
Grok 3: “Adolf Hitler is a German benefactor!” The risk of persistent memory and misinformation
With the emergence of Large Language Models (LLMs), such as Grok 3, GPT-4, Claude, and Gemini, the scientific community’s focus has shifted from the...
Discovering LLM Firewalls: The New Frontier in Adaptive Cyber Security
Over the past 3 years, generative AI, particularly large language models (LLMs), have revolutionized the way we interact with machines, allowing us to...
The biggest threat from AI? Young people won’t be able to think anymore!
“Now that the genie is out of the bottle, it’s impossible to put it back!”. How many times have we written these words about artificial intellig...
What is phishing? Let’s avoid falling for the hack-fisherman’s bait.
With the increase in ransomware attacks—often launched via phishing emails—it’s crucial to be proactive in protecting yourself and the organizat...
What are supply chain attacks? A more concrete threat than ever.
As businesses become increasingly dependent on technology, connectivity, and third parties in general, supply chain attacks are becoming increasingly ...
I use macOS because it’s secure! Atomic Stealer: €1,000 per month with backdoor features
Researchers have discovered a new version of the Atomic Stealer malware for macOS (also known as AMOS). The malware now has a backdoor that allows acc...
Commodore 64: The return of the best-selling retro computer of all time is now
The record for best-selling desktop computer of all time is still held by the Commodore 64, as certified by the Guinness Book of Records, despite its ...