Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Redhotcyber Banner Sito 320x100px Uscita 101125
Crowdstriker 970×120

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Redazione RHC
(12314 articoli, 10918 italiano, 1396 inglese)12314 articoli
10918 italiano, 1396 inglese

The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.

Ultimi articoli di Redazione RHC

Need a Microsoft Windows product key? No problem, ask Chat-GPT.
ChatGPT has once again proven vulnerable to unconventional manipulation: this time it issued valid Windows product keys, including one registered to t...
What is Cyber Security? Threats, Cybercrime, Protection, and Work
Cybersecurity has become one of the most important issues in the digital age we live in. With the increase in the number of connected devices, the wid...
Attacks on Artificial Intelligence: Adversarial Attacks and Data Poisoning.
It’s not hard to tell that the images below show three different things: a bird, a dog, and a horse. But to a machine learning algorithm, all three ...
AI Agents: The Intelligent Revolution Explained to Everyone
Imagine a digital assistant who not only answers your questions, but also acts for you, plans strategies, learns from its mistakes, and collaborates w...
RCE 0day Exploit for WinRAR and WinZIP for Sale on Exploit.in for Scam Phishing Emails
Recently, the popular underground forum exploit.in, currently closed and accessible by invitation only, has been offering exploits for a 0day vulnerab...
What was the first ransomware in history? Discovering Trojan AIDS
We often talk about ransomware on Red Hot Cyber and criminal cyber gangs. But who invented this dangerous cyber blackmail “weapon”? Today, ransomw...
Creeper & Reaper: The story of the first worm and the first antivirus software.
It’s not uncommon to find references to information technology innovations in video games. Ada Lovelace (the first programmer in history), gave her ...
Businesses are going bankrupt due to ransomware. Small and medium-sized businesses, beware!
Very often on RHC, we talk about cyber attacks and ransomware. But this time, we want to go further. We want to talk about the companies that didn’t...
What is ransomware? Let’s explore how RaaS works and what it means.
Many people often want to understand the ransomware phenomenon precisely, its meaning, the methods of violation, and the crime that revolves around it...
The Shellter Elite suite used by Red Teams to bypass EDRs is now being used by cybercrime
Shellter Project, maker of a commercial downloader for bypassing antivirus and EDR systems, has reported that hackers are using its Shellter Elite pro...
Is the end of state-led cyberspace invasions coming? The 56-page draft prepared by the UN
The eleventh final session of the Open-Ended Working Group (OEWG) on cybersecurity opened at the United Nations Headquarters in New York on July 7. Th...
Who are the most famous hackers in history?
We often talk about hackers, but who are the famous hackers that ever existed? Considered by many as eccentric geniuses and computer wizards, by other...
Underwater cables and the “cyber war of the seabed”. Between control, geopolitics and technology
Author: 5ar0m4n Publishing Date: 11/7/2021 We have often addressed the topic of undersea cables on RHC where we talked about the first submarine cable...
Pig Butchering Scam: How Pig Slaughter Is Becoming an Emotional Addiction Scam
In the interconnected labyrinth of the 21st century, where the desire for authenticity and the search for opportunity dance on the edge of paradox, a ...
A new Poc Exploit allows Privilege Excalation on Linux using the udisksd daemon
A proof-of-concept (PoC) exploit for a critical vulnerability that allows local privilege escalation has been developed, affecting several major Linux...