Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Redhotcyber Banner Sito 320x100px Uscita 101125
LECS 970x120 1

Author: Redazione RHC

Redazione RHC

The Red Hot Cyber Editorial Team provides daily updates on bugs, data breaches, and global threats. Every piece of content is validated by our community of experts, including Pietro Melillo, Massimiliano Brolli, Sandro Sana, Olivia Terragni, and Stefano Gazzella.

Through synergy with our industry-leading partners—such as Accenture, CrowdStrike, Trend Micro, and Fortinet—we transform technical complexity into collective awareness. We ensure information accuracy by analyzing primary sources and maintaining a rigorous technical peer-review process.

Numero di articoli trovati: 796

Sanctions are taking effect! Zhaoxin introduces KH-5000 server processors and KX-7000N desktop chip.

The Chinese company Zhaoxin presented a new generation of KH-5000 server processors at Expo 2025 in Shanghai. These chips are intended for the domestic market and should significantly strengthen the...

The United States is cutting spending on cybersecurity again and it’s a storm

In the first months of Donald Trump's new presidency, the U.S. federal government made drastic cuts to cybersecurity spending, cutting budgets, staff, and a range of initiatives aimed at protecting...

What is tailgating? When penetration tests aren’t enough and the Red Team needs physical security checks.

In red teaming, the term "tailgating" refers to a technique in which a team member attempts to gain unauthorized access to a protected area or computer system, such as by...

What are Living off the Land (LotL) attacks?

Living off the land means surviving on what you can forage, hunt, or grow, making the most of what nature provides. There could be multiple reasons for doing this: maybe...

Your email is “vibrating”! A “hot” flaw in Lovense exposes users’ emails.

The Lovense platform, which has long carved out a niche market for itself with app-controlled sex toys (including models such as Lush, Gush, and Kraken), is affected by a security...

Quantum computers are slowly evolving. Although far away, they have surpassed a millisecond state of coherence.

Physicists at Aalto University (Finland) have set a new world record for the duration of the coherent state of a superconducting qubit, the core of a quantum computer. They achieved...

New Phishing Attacks Using Fake Zoom Meetings Aim to Steal Corporate Credentials

A phishing attack that mimics an urgent Zoom meeting is being used by cybercriminals to steal corporate credentials, using a fake interface so realistic it's nearly indistinguishable from a real...

Boys recruited for murders and robberies: the FBI’s disturbing alert on the IRL Com group

The FBI has issued a warning about a rapidly growing threat from IRL Com, a subgroup of the underground group The Com that actively recruits teenagers to commit real-world crimes....

Supply Chain Attack: Millions of Projects at Risk Due to JavaScript Library Hack

The compromise of a widely used JavaScript library has put millions of projects worldwide at risk. The package in question has been a fundamental, yet unnoticed, component of the Node.js...

BreachForums is back online! 7.3 million posts and 340,000 users restored.

If weeds aren't pulled out by the roots, they'll grow back, much more vigorous than before. This is cybercrime, and this is the new rebirth, the fifth ever from the...