Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Enterprise BusinessLog 320x200 1
TM RedHotCyber 970x120 042543

Author: Redazione RHC

Redazione RHC

The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.

TikTok Accused of Illegally Tracking Users’ Data Across Apps

The popular video app TikTok has found itself at the center of a new scandal over violations of European data protection regulations. The service has been found to track users'...
Share on Facebook Share on LinkedIn Share on X

Naftali Bennett Telegram Account Hacked in Israel Politics

Former Israeli Prime Minister Naftali Bennett has admitted that his Telegram account was hacked, although his device was not compromised. He made the announcement following reports of a hacked iPhone...
Share on Facebook Share on LinkedIn Share on X

Cisco Secure Email Gateway Vulnerability Exploited: Act Now

A critical zero-day flaw in Cisco Secure Email Gateway and Cisco Secure Email and Web Manager devices is causing concern among security researchers. With over 120 vulnerable devices already identified...
Share on Facebook Share on LinkedIn Share on X

Airbus Eyes Sovereign Cloud to Mitigate US Data Risks

In recent months, a question has been emerging with increasing insistence on European corporate boards: is the US cloud really safe for all companies? Especially for those operating in strategic...
Share on Facebook Share on LinkedIn Share on X

North Korean Hackers Steal $2 Billion in Crypto, Targeting DeFi Sector

In 2025, North Korean hackers stole a record $2 billion in cryptocurrency , 51% more than the previous year. However, the number of attacks has decreased, while the damage has...
Share on Facebook Share on LinkedIn Share on X

Kimwolf Botnet: The Rising Threat of DDoS Attacks on IoT Devices

A new and formidable enemy has emerged in the cyber threat landscape: Kimwolf, a fearsome DDoS botnet, is having a devastating impact on devices worldwide. The consequences of this threat...
Share on Facebook Share on LinkedIn Share on X

54 Arrested in $Multi-Million ATM Jackpotting Scheme Linked to Tren de Aragua

A federal grand jury in the District of Nebraska has indicted a total of 54 people accused of participating in a vast criminal operation that used malware to steal millions...
Share on Facebook Share on LinkedIn Share on X

The Birth of World Wide Web: How Tim Berners-Lee Created the First Website

There you have it! On December 20, 1990, something epochal happened at CERN in Geneva. Tim Berners-Lee , a British computer genius, created the first website in history, info.cern.ch ,...
Share on Facebook Share on LinkedIn Share on X

WatchGuard Firewall Zero-Day Vulnerability CVE-2025-14733 Exploited

A critical zero-day vulnerability, identified as CVE-2025-14733, has left network administrators on their knees, forcing them into a race against time to secure their systems. This flaw, with a CVSS...
Share on Facebook Share on LinkedIn Share on X

Linux Kernel CVE-2025-68260 Vulnerability Fixed: Rust Code at Risk

The world of technology is a veritable battlefield, where coding geniuses challenge malicious attackers every day with exploits and security patches. That's why the recent discovery of a vulnerability in...
Share on Facebook Share on LinkedIn Share on X