Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Banner Ancharia Mobile 1
Banner Ancharia Desktop 1 1

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Redazione RHC
(12314 articoli, 10918 italiano, 1396 inglese)12314 articoli
10918 italiano, 1396 inglese

The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.

Ultimi articoli di Redazione RHC

Miniaturized Military Drone, Mosquito-Sized Model Arrives and China Offers It
In the military sector, the trend to miniaturize drones seems to know no limits, especially when the goal is to operate without being detected. An exa...
Cybersecurity, Italy on the podium with four young people. There is also Leonardo already protagonist in the RHC CTF
The first edition of the International Cybersecurity Olympiad ended in Singapore with an excellent result for Italy. Four Italian students reached the...
Cyber Security: CISA and NSA Recommend Secure Programming Languages
The main US cybersecurity agencies, CISA and NSA, have published a joint document recommending that software developers opt for programming languages ...
Apple and Google under pressure: German regulator wants to remove DeepSeek
Following the Italian data protection regulator, Germany’s data protection watchdog has now asked Apple and Alphabet subsidiary Google to remove the...
A former Australian university student has been accused of hacking Western Sydney University
New South Wales police have arrested a 27-year-old former Western Sydney University student who had repeatedly hacked into the university’s systems,...
Skynet is coming: the malware that attacks Artificial Intelligence!
An unusual example of malicious code has been discovered in a real computing environment, which for the first time recorded an attempt to attack not c...
Cybersecurity, from NIS2 to the Cyber Resilience Act: Fortinet guides companies in compliance with the new regulatory landscape
By Aldo Di Mattia, Director of Specialized Systems Engineering and Cybersecurity Advisor Italy and Malta at Fortinet After years of defining new regul...
Critical Vulnerabilities Discovered in Hundreds of Brother and Other Printers
Hundreds of printer models from Brother and other manufacturers (Fujifilm, Toshiba, Ricoh and Konica Minolta) have been found to be vulnerable to seri...
Pope warns: “AI is not the devil, but it can become one without ethics”
The head of the Catholic Churchhas expressed concern about the way today’s children and adolescents interact with digital technologies. In his viewt...
Microsoft 365 Under Attack: How Hackers Use Direct Send to Send Phishing Emails
A sophisticated phishing campaign that targeted over 70 organizations by exploiting Microsoft 365’s Direct Send feature. The campaign, which began i...
Warning! WinRAR: Critical Vulnerability That Could Run Malware
WinRAR developers have fixed a Directory Traversal vulnerability, which has been assigned the identifier CVE-2025-6218. Under certain circumstances, t...
He died because of ransomware! Another victim joins the list
This is not the first time that a cyber attack has resulted in the loss of human lives.We had already discussed it in the article “I deferichò per ...
A new fileless infostealer is being spread by Telegram and legitimate services
TLP: AMBERAnalyst: Agostino Pellegrino, Crescenzo Cuoppolo, Alessio BandiniLast revision date: 2025-06-24 This forensic technical report documents the...
Citrix: New Critical Vulnerability from 9.2 Affects NetScaler – Attacks Underway!
Citrix has reported a new critical vulnerability in its NetScaler appliances, already actively exploited by attackers. The problem is identified with ...
Fox Kitten and Br0k3r: The Iranian Cyber Contractor Collaborating with Ransomware Gangs
We continue our series of articles on IABs by writing about an Iranian cyber contractor that not only works as an initial access broker but also provi...