Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
UtiliaCS 320x100
Banner Desktop

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Nessun autore trovato con i filtri selezionati.

Ultimi articoli di Redazione RHC

Phishing Attacks Surge in Black Friday Season: Stay Vigilant
This year, too, cybercriminals are taking advantage of seasonal shopping periods to spread phishing websites and fraudulent promotions, aiming to stea...
Human Washing Machine Launched: Japan’s Science Unveils Unique Device
Japanese company Science has launched a washing machine for humans. The 2.30-meter-long capsule bathes a person in 15 minutes and attracted considerab...
Brazilian Systems Targeted in Sophisticated OAST Exploit Campaign
Security researchers have discovered a sophisticated exploit campaign that leverages a private out-of-band application security testing (OAST) service...
Australian Man Jailed for Evil Twin Wi-Fi Scam Targeting Airline Passengers
An Australian court has convicted a 44-year-old man who stole the personal data of airline passengers and airport visitors over several months . He wa...
KrakenBite Phishing Service Exposed
The underground cybercrime market continues to evolve rapidly, fueled by specialized groups designing and selling tools for increasingly sophisticated...
ADC Aerospace Hit by Play Ransomware Attack, Data Breach Feared
American aviation and defense components manufacturer ADC Aerospace has found itself in the spotlight due to a possible cyber attack by the Play ranso...
Calendar Subscriptions: A Hidden Danger in Your Digital Life
Digital calendars have long been a convenient way to keep track of daily activities, but new research from Bitsight shows that this familiar tool can ...
Airbus A320 Recall Due to ELAC System Failure Caused by Solar Flares
Airbus has announced the recall of approximately 6,500 A320 aircraft due to potential failures in the ELAC control system caused by powerful solar fla...
OpenAI Faces Fierce Competition from Google’s Gemini 3
OpenAI, a company valued at around $500 billion, is facing increasingly fierce technical competition . Google’s latest version of Gemini 3 , in part...
Leonardo’s Michelangelo Dome: AI-Powered Defense Against Hypersonic Threats
Italian defense company Leonardo has unveiled its new Michelangelo Dome system . According to the company, it is designed to counter hypersonic missil...
Windows 11 Password Issue: Microsoft Warns of Invisible Icon Bug
Microsoft has warned users of a Windows 11 glitch: after the release of updates starting in August 2025 , the password-based sign-in button may disapp...
CISA Warns of OpenPLC ScadaBR Vulnerability Exploitation
The Cybersecurity and Infrastructure Security Agency (CISA) has expanded its list of exploited vulnerabilities (KEVs), reporting a new vulnerability a...
The Power of A* Algorithm in Artificial Intelligence and Robotics
Nearly everything artificial intelligence does today is based on a simple but fundamental idea: any problem can be reduced to finding a path from a st...
WhatsApp Messages Contain Hidden GPS Data, Expert Warns
According to computer forensics expert Elom Daniel, WhatsApp messages can contain hidden geolocation data even when the user hasn’t intentionally sh...
DeepSeekMath-V2 Revolutionizes Math with AI-Powered Proof Verification
The Chinese company DeepSeek has introduced a new specialized model for solving mathematical problems , DeepSeekMath-V2. This large-scale language mod...
Shai-Hulud Attack: npm Supply Chain Compromised Again
The npm ecosystem is once again at the center of a large-scale supply chain attack attributed to the Shai-Hulud campaign. This wave has led to the rel...
ChatGPT to Introduce Targeted Ads, Changing Monetization Strategy
Until now, ChatGPT has been ad-free: no banners, no hidden promotions. Even the paid versions worked without pushy offers. But that could change soon....
GitLab Security Updates Fix High-Severity Vulnerabilities CVE-2024-9183
GitLab has released critical security updates for its Community Edition (CE) and Enterprise Edition (EE) to address several high-severity vulnerabilit...
Apache SkyWalking Vulnerability Exposes Users to XSS Attacks
A vulnerability was recently discovered in Apache SkyWalking , a popular application performance monitoring tool, that attackers could exploit to exec...
Bloody Wolf Attacks Central Asia with NetSupport RAT via Java Exploits
Group-IB specialists have recorded new attacks by the Bloody Wolf hacker group, which has been targeting Kyrgyzstan since June 2025 and has expanded i...