Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
TM RedHotCyber 320x100 042514
TM RedHotCyber 970x120 042543

Author: Redazione RHC

Redazione RHC

The Red Hot Cyber Editorial Team provides daily updates on bugs, data breaches, and global threats. Every piece of content is validated by our community of experts, including Pietro Melillo, Massimiliano Brolli, Sandro Sana, Olivia Terragni, and Stefano Gazzella.

Through synergy with our industry-leading partners—such as Accenture, CrowdStrike, Trend Micro, and Fortinet—we transform technical complexity into collective awareness. We ensure information accuracy by analyzing primary sources and maintaining a rigorous technical peer-review process.

Numero di articoli trovati: 914

They slept on networks for 393 days! Chinese state hackers and the BRICKSTORM backdoor

According to Google Threat Intelligence , the China-linked espionage group UNC5221 has carried out a series of successful intrusions into corporate networks since March of this year, exploiting previously unknown...

Code as we knew it is dead! Artificial Intelligence writes the future.

Since 2013, the IEEE has published an annual interactive ranking of the most popular programming languages . However, traditional methods of measuring popularity may be losing their meaning today, due...

Cryptocurrencies, ransomware, and hamburgers: the fatal combo for Scattered Spider

The U.S. Department of Justice and British police have charged Talha Jubair, 19, a resident of East London, who investigators believe is a key member of Scattered Spider , a...

The freebie party is over! Open source infrastructure is at risk and needs funding.

An open letter signed by major open source foundations has raised the alarm about the future of the infrastructure that supports modern software development. The Open Source Security Foundation (OpenSSF),...

Kali Linux 2025.3 is out! A new release with improvements and new tools.

Kali Linux developers have released a new release, 2025.3 , which expands the distribution's functionality and adds ten new penetration testing tools. The update improves deployment processes in virtual environments,...

Violent social media and video games: the new ticking time bomb for teens.

The uncontrolled use of social media and violent video games poses a growing threat to adolescents at a crucial stage of their development. Child and adolescent health experts warn that...

WhatsApp introduces in-app message translation

WhatsApp has announced a new feature that allows for in-app message translation . The company emphasizes that language barriers often limit free communication, considering its service is used daily by...

TikTok, the app setting the US ablaze: billion-dollar deal for total control

TikTok's fate in the United States is now inextricably linked to political negotiations. The White House has announced that the service's recommendation algorithm will be replicated and adapted solely based...

GitHub strengthens npm security against supply chain attacks.

GitHub has announced major changes to its npm authentication and publishing system, aimed at strengthening protection against supply chain attacks. The updates were prompted by the recent Shai-Hulud campaign, a...

Towards AGI: Google DeepMind warns, AI could ignore humans

Google DeepMind researchers have released an updated version of their AI risk assessment framework, Frontier Safety Framework 3.0 . This paper examines how generative models can run amok and pose...