Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
LECS 320x100 1
Fortinet 970x120px

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Redazione RHC

Redazione RHC
(12311 articoli, 10916 italiano, 1395 inglese)12311 articoli
10916 italiano, 1395 inglese

The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.

Ultimi articoli di Redazione RHC

WhiteHouse.gov Data Breach: Threat Actors Leak Sensitive Information!
Recently, a threat actor on a dark web forum has posted a claim regarding an alleged data breach involving WhiteHouse.gov. The post, made by a user na...
Ferrari avoids deepfake scam! An executive unmasks the CEO’s fake audio messages
In an incident earlier this month, a Ferrari executive found himself receiving unusual messages that appeared to come from the company’s CEO, Benede...
A Threat Actors Posts Update on Luxottica’s 2021 Data Breach
Recently, a threat actor in a clandestine forum posted an update on the 2021 data breach concerning the giant Luxottica, one of the world’s largest ...
Exposed the Data of 3,379 Spanish Doctors! When Fraud Becomes “On-Target”
Recently, a threat actor in an underground forum called Breach Forums published an alleged data breach. The post claims to have exposed the names, dep...
The other side of cybersecurity: stress and burnout are “by design” in domain experts
We often talk about cyber security and the importance of a complete cyber program today. Today, however, we will focus on analyzing another important ...
Musk’s Supercomputer in Memphis is ready! 100,000 liquid-cooled Nvidia H1s.
Elon Musk, who simultaneously heads six innovative companies-Tesla, SpaceX, Starlink, X (formerly known as Twitter), Neuralink, and xAI-is not stoppin...
Microsoft releases USB tool to fix CrowdStrike BSOD problem on Windows 10 and 11
Microsoft has released a tool for system administrators to simplify the process of fixing the blue screen of death (BSOD) on Windows 10 and 11 compute...
Citrix Netscaler ADC and Gateway plagued by serious DOS and Open Redirect flaw
Two vulnerabilities have been identified in NetScaler ADC and NetScaler Gateway. Affected Versions: The following supported versions of NetScaler ADC ...
A Brief History of Artificial Intelligence: From Alan Turing to Generative AI
Artificial Intelligence (AI) is in the Spotlight Today, Generating Unprecedented Interest and Debate. However, it’s important to recognize that this...
HijackLoader Expands Techniques to Improve Defense Evasion 
Donato Onofri e Emanuele Calvelli Endpoint Security & XDR CrowdStrike. CrowdStrike researchers have identified a HijackLoader (aka IDAT Loader) ...
RHC interviews 8base: The cybergang that provides the security AUDIT report to the hacked company
A few days ago we published an article on the new cybergang 8Base. 8base define themselves as “honest and simple pentesters. We offer companies the ...
Taking cyberattacks seriously: the (likely) Albanian cyber aggression and the Iranian responsibility
Summary: 1. The cyber aggression on Albania.- 2. A legal analysis of cyber aggression.- 3. The problem of cyber malicious activities attribution.- 4. ...
Hacker gang OPERA1ER stole $11 million from African companies
Amsterdam, 07.11.2022 — Group-IB has today issued a new report, “OPERA1ER. Playing God without permission,” in collaboration withthe researc...
LockBit 3.0: making the ransomware Great Again
LockBit is a major player in the ransomware scene and has contributed heavily for this cyber-crime model to become one of the most popular and imitate...
Why privacy does not exist
Privacy, privacy, privacy, … privacy comes first. How many times have we heard this sentence? Yes, because we talk a lot about this topic, we talk a...