Welcome to Red Hot Cyber | Cybersecurity News
Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
2nd Edition GlitchZone RHC 320x100 2
LECS 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Gartner Warns: AI-Powered Browsers Pose Significant Security Risks to Businesses
Di Redazione RHC - 10/12/2025

Gartner analysts have urged businesses to temporarily stop using browsers with built-in artificial intelligence (AI) capabilities . In a recent advisory, the company emphasizes that such tools pose un...

Immagine del sito
Fortinet Vulnerability: Critical FortiOS, FortiWeb, FortiProxy, FortiSwitchManager Update
Di Redazione RHC - 10/12/2025

A critical vulnerability affecting the FortiOS, FortiWeb, FortiProxy , and FortiSwitchManager product lines has been reported by Fortinet via an urgent security advisory. This advisory was issued in c...

Immagine del sito
US Allows Nvidia to Sell Advanced AI Chips to China, Easing Export Restrictions
Di Redazione RHC - 09/12/2025

It seems the White House isn’t entirely clear … at least judging by yet another change of heart regarding the sale of Nvidia’s advanced chips to China, with the Trump administration having decid...

Immagine del sito
Ransomware Attacks Decline in 2024, But Threat Remains High with $734M in Ransom
Di Redazione RHC - 09/12/2025

According to a recently released report by the Financial Crimes Enforcement Network (FinCEN) , global ransomware activity peaked in 2023, only to plummet in 2024. This decline is attributed to success...

Immagine del sito
Intellexa Exploits Zero-Day Vulnerabilities with Spyware
Di Redazione RHC - 08/12/2025

Despite significant geopolitical challenges, the mercenary spyware industry remains a resilient and persistent threat; in this context, the well-known vendor Intellexa continues to expand its arsenal....

A RCE vulnerability in Wing FTP Server rated 10 opens the door to 10,000 companies.

Huntress researchers have detected active exploitation of a critical vulnerability in Wing FTP Server, just one day after its public disclosure. The v...
Redazione RHC - 12/07/2025 - 18:12

There’s no such thing as zero risk! There’s only one risk you need to know to manage.

Cybersecurity is a critically important topic for companies and organizations of all sizes and industries. As business operations and information mana...
Redazione RHC - 12/07/2025 - 10:16

Working in cybersecurity. Cybersecurity needs you.

We know it by now. Every country in the world (including Italy) has a huge shortage of cybersecurity experts, while cybercrime is rampant in every cor...
Redazione RHC - 12/07/2025 - 10:13

What is cyber warfare? Between geopolitics, economics, and technology.

Cyber warfare is a form of conflict that takes place at the cyber and digital level. This form of warfare has become increasingly widespread in recent...
Redazione RHC - 12/07/2025 - 10:07

AI stymied by energy constraints, innovative space solutions needed

During an interview on the Manifold podcast, Omar Shams, head of the Google Agents project, emphasized that besides chips, the other major limitation ...
Redazione RHC - 12/07/2025 - 09:40

Donald Trump admits the US is hacking China: “That’s the way of the world.”

President Donald Trump briefly left Maria Bartiromo speechless during an interview when he insinuated that the United States was hacking Chinese syste...
Redazione RHC - 12/07/2025 - 09:40

A RCE vulnerability in Wing FTP Server rated 10 opens the door to 10,000 companies.

- July 11th, 2025

Huntress researchers have detected active exploitation of a critical vulnerability in Wing FTP Server, just one day after its public disclosure. The vulnerability CVE-2025-47812 has been assigned the highest severity...

Facebook Linkedin X

There’s no such thing as zero risk! There’s only one risk you need to know to manage.

- July 11th, 2025

Cybersecurity is a critically important topic for companies and organizations of all sizes and industries. As business operations and information management become increasingly digital, the risk of cyberattacks has become...

Facebook Linkedin X

Working in cybersecurity. Cybersecurity needs you.

- July 11th, 2025

We know it by now. Every country in the world (including Italy) has a huge shortage of cybersecurity experts, while cybercrime is rampant in every corner of the globe. This...

Facebook Linkedin X

What is cyber warfare? Between geopolitics, economics, and technology.

- July 11th, 2025

Cyber warfare is a form of conflict that takes place at the cyber and digital level. This form of warfare has become increasingly widespread in recent years, thanks to the...

Facebook Linkedin X

AI stymied by energy constraints, innovative space solutions needed

- July 11th, 2025

During an interview on the Manifold podcast, Omar Shams, head of the Google Agents project, emphasized that besides chips, the other major limitation to AI development is energy. It's often...

Facebook Linkedin X

Donald Trump admits the US is hacking China: “That’s the way of the world.”

- July 11th, 2025

President Donald Trump briefly left Maria Bartiromo speechless during an interview when he insinuated that the United States was hacking Chinese systems. The president highlighted the "large trade deficit with...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE