Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
HackTheBox 320x100 1
UtiliaCS 970x120

Author: Redazione RHC

Redazione RHC

The Red Hot Cyber Editorial Team provides daily updates on bugs, data breaches, and global threats. Every piece of content is validated by our community of experts, including Pietro Melillo, Massimiliano Brolli, Sandro Sana, Olivia Terragni, and Stefano Gazzella.

Through synergy with our industry-leading partners—such as Accenture, CrowdStrike, Trend Micro, and Fortinet—we transform technical complexity into collective awareness. We ensure information accuracy by analyzing primary sources and maintaining a rigorous technical peer-review process.

Numero di articoli trovati: 900

38 million Italian phone numbers for sale on the dark web. It’s smishing!

Seven out of ten Italians have their phone numbers included in this database. But what does it mean to have such a large number of phone numbers concentrated within a...

Apitor, the first robot that helps children do their homework and the whistleblower for China

The U.S. Department of Justice has filed a lawsuit against Apitor Technology, accusing it of secretly collecting children's location data through a Chinese partner without their parents' knowledge or consent....

Hackable restaurant robots could serve sushi… at the attacker’s home.

An independent security specialist, known by the nickname BobDaHacker, discovered security flaws in Pudu Robotics (the world's leading provider of commercial service robots). The vulnerabilities allowed attackers to redirect the...

Figure 02, the robot that loads the dishwasher with precision

California-based company Figure has unveiled another milestone for its humanoid Figure 02: the robot loaded a dishwasher with high precision using the versatile Helix model, based on the Vision-Language-Action (VLA)...

If Flash is dead, here’s the SVG Assassin! Phishing 2.0 is in high definition.

Cybercriminals have launched a new wave of attacks using SVG files to distribute phishing pages. Experts at VirusTotal have reported that attackers are impersonating the Colombian prosecutor's office, distributing email...

The Dark Side of Windows Drivers: How to Steal Data While Ignoring EDR

A recent study conducted by Workday's Offensive Security team highlighted a vulnerability in Windows drivers that effectively bypasses Endpoint Detection and Response (EDR) tools. This technique exploits direct disk reading,...

Beyond espionage: “Salt Typhoon” also reportedly targeted Donald Trump

A vast Chinese cyberespionage operation, dubbed "Salt Typhoon," was recently described as the most ambitious ever attributed to Beijing. According to the report, this campaign resulted in the theft of...

GhostRedirector: The Black SEO Redirect Campaign That Manipulates Search Engines

A cybercriminal group, dubbed GhostRedirector by ESET researchers and linked to the Chinese ecosystem, has quietly deployed a global search engine manipulation scheme based on hacked Windows hosts. According to...

Windows: Security updates cause problems with UAC and app installation

Microsoft has announced that the August 2025 Windows security updates may cause unexpected User Account Control (UAC) prompts and issues when installing apps. The bug affects non-administrator users on all...

Supercomputers: Italy ranks sixth and tenth in the 2025 TOP500 rankings.

The world of supercomputers has entered the era of exascale computing. The June 2025 TOP500 ranking recorded three American systems at the top, a sensational debut from Europe, and a...