Red Hot Cyber
Cybersecurity, Cybercrime News and Vulnerability Analysis
Crowdstriker 970×120

Author: Redazione RHC

Redazione RHC

The Red Hot Cyber Editorial Team provides daily updates on bugs, data breaches, and global threats. Every piece of content is validated by our community of experts, including Pietro Melillo, Massimiliano Brolli, Sandro Sana, Olivia Terragni, and Stefano Gazzella.

Through synergy with our industry-leading partners—such as Accenture, CrowdStrike, Trend Micro, and Fortinet—we transform technical complexity into collective awareness. We ensure information accuracy by analyzing primary sources and maintaining a rigorous technical peer-review process.

Numero di articoli trovati: 375

AI assistants lie! After generating errors: “I was panicking.”

AI-powered programming assistants present themselves as tools capable of transforming any English text into working code. Users no longer need to know language syntax, debug commands, or understand file structures:...

What is tailgating? When penetration tests aren’t enough and the Red Team needs physical security checks.

In red teaming, the term "tailgating" refers to a technique in which a team member attempts to gain unauthorized access to a protected area or computer system, such as by...

What are Living off the Land (LotL) attacks?

Living off the land means surviving on what you can forage, hunt, or grow, making the most of what nature provides. There could be multiple reasons for doing this: maybe...

Boys recruited for murders and robberies: the FBI’s disturbing alert on the IRL Com group

The FBI has issued a warning about a rapidly growing threat from IRL Com, a subgroup of the underground group The Com that actively recruits teenagers to commit real-world crimes....

Microsoft reduces AI’s environmental impact with human and agricultural waste.

Microsoft has decided to reduce the environmental impact of its artificial intelligence by turning to a seemingly unlikely resource: human and agricultural waste. The company has signed a contract with...

Google is turning the web into a showcase for AI! A near-term disaster for the digital economy.

Google is turning its search engine into a showcase for artificial intelligence, and that could spell disaster for the entire digital economy. According to a new study from the Pew...

Container isolation is at risk. Just 3 lines of code to breach NVIDIA’s AI environments.

Cloud security firm Wiz has identified a critical vulnerability in the NVIDIA Container Toolkit, identified as CVE-2025-23266 and with a CVSS score of 9.0. The vulnerability, dubbed NVIDIAScape, could pose...

What is AIOps? How Artificial Intelligence Works for IT Operations

AIOps (Artificial Intelligence for IT Operations) is the application of artificial intelligence - such as machine learning, natural language processing, and advanced analytics - to automate, simplify, and optimize IT...

What are penetration tests, why are they done, who performs them, and the benefits for organizations.

Penetration testing is an increasingly widespread practice in the field of cybersecurity. It is a real simulation of a cyber attack, conducted by a team of security experts, in order...

New wave of Microsoft SharePoint Server attacks claims victims: over 100 organizations affected

We recently discussed a critical zero-day vulnerability, CVE-2025-53770, in Microsoft SharePoint Server, which bypasses the previous security flaw CVE-2025-49706. It was already known at the time that the vulnerability involved...