Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
LECS 320x100 1
HackTheBox 970x120 1

Author: Redazione RHC

Redazione RHC

The Red Hot Cyber Editorial Team provides daily updates on bugs, data breaches, and global threats. Every piece of content is validated by our community of experts, including Pietro Melillo, Massimiliano Brolli, Sandro Sana, Olivia Terragni, and Stefano Gazzella.

Through synergy with our industry-leading partners—such as Accenture, CrowdStrike, Trend Micro, and Fortinet—we transform technical complexity into collective awareness. We ensure information accuracy by analyzing primary sources and maintaining a rigorous technical peer-review process.

Numero di articoli trovati: 908

iPad with M5 chip spotted: Promising performance on Geekbench

An unknown iPad with an M5 chip has been spotted on Geekbench . The device scored 4,133 in the single-core test and 15,437 in the multi-core test . The listing...

China launches underwater data center to reduce carbon footprint

China is preparing to launch one of the first commercial underwater data center projects . In mid-October, a capsule containing servers will be lowered into the sea off the coast...

When AI writes poetry: is the future of human creativity over?

In 1950, Alan Turing, considered the father of artificial intelligence, was still wondering "Can machines think?" Today, more than seventy years later, public perception seems to have changed radically: more...

The AI we love! From years to just months to discover a molecule for Crohn’s disease

Antibiotics for inflammatory bowel disease can be a double-edged sword. While they suppress inflammation, they also kill beneficial bacteria, not just harmful ones. This often worsens symptoms. In this situation,...

Discord Confirms Hack Attack: Sensitive Information at Risk

A third-party customer service provider was compromised by hackers, who gained access to partial payment information and personally identifiable information for some Discord users. The attack, which occurred on September...

US raises alarm over core chip manufacturing: Too dependent on China by 2030

On October 2, the Financial Times published an analysis by Mike Kuiken, a senior national security adviser and fellow at the Hoover Institution. The expert warned of a little-discussed but...

Can a backdoor be implemented for only one country? Apple resists UK demands.

The United Kingdom has again attempted to force Apple to access encrypted backups of user data stored on iCloud . The new request comes six months after the company disabled...

KaruHunters Claims Cyber Attack on RIPE NCC

A post recently appeared on a popular underground forum that's attracting the attention of the cybersecurity community. A user with the handle KaruHunters , already known for his activities within...

Microsoft IIS under attack from Chinese criminal hackers: How UAT-8099 exploits authoritative websites

A Chinese cybercriminal group known as UAT-8099 has been identified by Cisco Talos as responsible for a large-scale attack campaign. The attacks, which began in April 2025, primarily targeted vulnerable...

Computer science is no longer a safe career! What’s changing for students and companies?

For decades, computer science was considered a stable career choice, brimming with opportunities. Today, however, students, universities, and businesses face a radically changed landscape, where once-certain career paths have become...