Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Banner Ancharia Mobile 1
Fortinet 970x120px

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Redazione RHC
(12314 articoli, 10918 italiano, 1396 inglese)12314 articoli
10918 italiano, 1396 inglese

The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.

Ultimi articoli di Redazione RHC

The hacker group LOpht predicted the future of the Internet in 1998, but the US didn’t listen to them.
“If you’re looking for computer security, then the Internet is not the place to be.” Said Mudge, then 27, with the look of a biblical prophet wi...
Linux Pwned! Privilege Escalation on SUDO in 5 seconds. HackerHood tests the CVE-2025-32463 exploit
Yesterday, Red Hot Cyber published an in-depth analysis of a gserious vulnerability discovered in SUDO (CVE-2025-32463), which allows escalation of pr...
North Korean Hackers on the Payroll: How Companies Paid Salaries to North Korean IT Specialists
The US Department of Justice has announced the discovery ofa large-scale scheme in which fake IT specialists from the DPRK obtained jobs at American c...
Do you really know what Hacktivism means? It’s a “special message of hope!”
“Hacktivism, a special message of hope.” Thus begins the “Hacktivism Declaration”, published on July 4, 2001 by the famous hacker group Cult o...
The History of FreeBSD
We have often talked about Linux and the open source world, Windows and proprietary software and operating systems in general. But starting from the s...
HoneyPLC: the new honeypot that revolutionizes the defense of industrial plants
Industrial Control Systems (ICS), critical to the operation of critical infrastructure such as power, water and transportation networks, are increasin...
Italian Scientists: Federico Faggin, the Italian who invented the microprocessor.
Among the illustrious Italian scientists, creators of cutting-edge technological innovations (we have already talked about Per Giorgio Perotto and Leo...
The first message ever sent over the internet
Today exchanging a message via WhatsApp or Skype is a normal gesture, which is part of the activities we carry out in our daily lives. In all history ...
Discovering Predatory Sparrow: Identity, Goals, and Digital Arsenal of the Mysterious Threat Actor
On June 17, 2025, a cyber attack paralyzed Bank Sepah, one of Iran’s major financial institutions. The attack was claimed by the Predatory Sparrow g...
Famous hackers: the sad story of Jonathan James, aka c0mrade.
He was born on December 12, 1983, in a small village called Pinecrest located in Miami-Dade County, Florida. His father was a computer programmer and ...
Famous Hackers: The Story of Gary McKinnon.
A few months after the attacks on the World Trade Center, a strange message appeared on a U.S. Army computer: “Your security system is shit” it re...
DuckDuckGo Updates Scam Blocker: Say Goodbye to Online Scams and Fake Sites!
The Scam Blocker tool built into DuckDuckGo browser has been updated to protect against online scams. Now detects fake e-commerce sites, cryptocurre...
Cyberattacks on NFC contactless payments increase, new global threat
A new series of cyber attacks has been detected by ESET specialists, which sees the contactless payments sector with NFC technology as the protagonist...
The Race to 0day! China Advances in Offensive Cyberpower, While the US Is Forced to Chase
China’s growing rise has prompted U.S. officials to strongly emphasize the need to improve its offensive cyber capabilities. However, some doubts re...
Cyberbullying and Digital Terror: Why Betti’s Comic Makes You Feel Uncomfortable (and That’s a Good Thing)
When I decided to write this story of Betti, it was certainly not to make a “nice” or “easy” comic, to read on a sunny afternoon at the beach ...