Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Cyber Offensive Fundamentals 320x200 V0.1
Banner Ancharia Desktop 1 1

Author: Redazione RHC

Redazione RHC

The Red Hot Cyber Editorial Team provides daily updates on bugs, data breaches, and global threats. Every piece of content is validated by our community of experts, including Pietro Melillo, Massimiliano Brolli, Sandro Sana, Olivia Terragni, and Stefano Gazzella.

Through synergy with our industry-leading partners—such as Accenture, CrowdStrike, Trend Micro, and Fortinet—we transform technical complexity into collective awareness. We ensure information accuracy by analyzing primary sources and maintaining a rigorous technical peer-review process.

Numero di articoli trovati: 797

Criminal hackers claim responsibility for attack on Naval Group. 72 hours to pay the ransom.

France's largest defense shipbuilder, Naval Group, is facing a potentially serious cybersecurity incident following claims by threat actors that they have compromised critical internal systems, including those related to French...

Container isolation is at risk. Just 3 lines of code to breach NVIDIA’s AI environments.

Cloud security firm Wiz has identified a critical vulnerability in the NVIDIA Container Toolkit, identified as CVE-2025-23266 and with a CVSS score of 9.0. The vulnerability, dubbed NVIDIAScape, could pose...

What is AIOps? How Artificial Intelligence Works for IT Operations

AIOps (Artificial Intelligence for IT Operations) is the application of artificial intelligence - such as machine learning, natural language processing, and advanced analytics - to automate, simplify, and optimize IT...

UK Says STOP Ransomware Attacks! Stop Public Administration Ransom Payments

The UK government has announced preparations for a radical measure to combat cybercrime: a ban on paying ransoms after ransomware attacks. The new ban applies to public sector organizations and...

ToolShell: Microsoft SharePoint Zero-Day Vulnerability Has Been Under Attack Since Early July

According to cybersecurity experts, several Chinese hacker groups are exploiting a series of zero-day vulnerabilities in Microsoft SharePoint in their attacks. In particular, it emerged that attackers also compromised the...

What are penetration tests, why are they done, who performs them, and the benefits for organizations.

Penetration testing is an increasingly widespread practice in the field of cybersecurity. It is a real simulation of a cyber attack, conducted by a team of security experts, in order...

New wave of Microsoft SharePoint Server attacks claims victims: over 100 organizations affected

We recently discussed a critical zero-day vulnerability, CVE-2025-53770, in Microsoft SharePoint Server, which bypasses the previous security flaw CVE-2025-49706. It was already known at the time that the vulnerability involved...

What is Hardening: Discovering a Preemptive Strategy for Threat Mitigation

We often talk about "hardening" systems, but many people still don't know exactly what we're talking about. We've almost all discovered the pillars of cybersecurity, and among them are the...

Uncle Bot, the humanoid robot that’s conquering China and scaring the US

A humanoid robot dressed in casual clothes, resembling an average man, has gained unexpected popularity in China. Nicknamed "Uncle Bot on the internet, it rose to fame thanks to a...

Mercedes-Benz and Microsoft are teaming up to integrate Teams and Copilot 365 into cars starting this summer.

On July 16, Mercedes-Benz announced in a press release the expansion of its collaboration with Microsoft, introducing the latest Office solutions and collaboration tools, including an updated version of the...