Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Crowdstrike 320×100
Banner Ancharia Desktop 1 1

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Redazione RHC
(12314 articoli, 10918 italiano, 1396 inglese)12314 articoli
10918 italiano, 1396 inglese

The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.

Ultimi articoli di Redazione RHC

The History of the Linux Kernel (2 of 2). Early Hackers Up to Version 1.0.
Article by Pietro Cornelio and Massimiliano Brolli Previous articles: The history of the Linux Kernel (1 of 2). From Torvalds to the hacker community ...
The History of the Linux Kernel (1 of 2). From Torvalds to the Hacker Community
Article by Pietro Cornelio and Massimiliano Brolli The history of the Linux Kernel is a story of pure hacking as well as being a miracle of “collabo...
Cult of the Dead Cow (cDc). The story of the most famous hacker group.
Hacker culture, as we’ve already discussed, is a fascinating subject that has evolved significantly over time to reach the present day. We talked ab...
Apple 2: the story of a great success.
On June 10, 1977, the Apple II went on sale, the historic microcomputer that kicked off the home computing revolution. We’d like to dedicate an arti...
Russian domestic hackers Cozy Bear (APT29). Analysis of the main attacks and their TTPs.
Author: Gianluca Tiepolo APT29 is a highly sophisticated Advanced Persistent Threat (APT) group that has been attributed to Russia’s Foreign Intelli...
Critical Vulnerability in FortiWeb: Score 9.6 and Unauthorized SQL Commands
A new vulnerability, tracked under CVE-2025-25257, was recently published affecting several versions of Fortinet FortiWeb. This vulnerability could al...
A RCE vulnerability in Wing FTP Server rated 10 opens the door to 10,000 companies.
Huntress researchers have detected active exploitation of a critical vulnerability in Wing FTP Server, just one day after its public disclosure. The v...
There’s no such thing as zero risk! There’s only one risk you need to know to manage.
Cybersecurity is a critically important topic for companies and organizations of all sizes and industries. As business operations and information mana...
Working in cybersecurity. Cybersecurity needs you.
We know it by now. Every country in the world (including Italy) has a huge shortage of cybersecurity experts, while cybercrime is rampant in every cor...
What is cyber warfare? Between geopolitics, economics, and technology.
Cyber warfare is a form of conflict that takes place at the cyber and digital level. This form of warfare has become increasingly widespread in recent...
AI stymied by energy constraints, innovative space solutions needed
During an interview on the Manifold podcast, Omar Shams, head of the Google Agents project, emphasized that besides chips, the other major limitation ...
Donald Trump admits the US is hacking China: “That’s the way of the world.”
President Donald Trump briefly left Maria Bartiromo speechless during an interview when he insinuated that the United States was hacking Chinese syste...
TapTrap Attack: How to Get Yourself to Click Things Even Your Mom Wouldn’t Approve of
TapTrap exploits user interface animations to bypass Android’s permissions system, allowing it to access sensitive data or trick the user into perfo...
AI will end the traditional software industry just as the Internet has changed traditional media.
Generative AI, including tools like Cursor and ClaudeCode, are dramatically reducing the cost and time of software development. What once cost hundred...
Critical Vulnerability in the Linux Kernel: A New Privilege Escalation
A critical double-free vulnerability has been discovered in the pipapo set module of the NFT subsystem of the Linux kernel. An unprivileged attacker c...