Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Banner Ancharia Mobile 1
Crowdstriker 970×120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Critical RCE exploit in Microsoft WSUS actively exploited. CISA warns: imminent risk
Di Redazione RHC - 25/10/2025

A global alert has been issued by the United States Cybersecurity and Infrastructure Security Agency (CISA) regarding the active exploitation of a critical remote code execution (RCE) flaw in Microsof...

Immagine del sito
No flesh, no bones, just code! Channel 4’s first AI presenter arrives.
Di Redazione RHC - 24/10/2025

On Monday 20 October, Channel 4 broadcast a full-length documentary hosted by a creative TV presenter powered entirely by artificial intelligence. ” I’m not real. For the first time on a B...

Immagine del sito
Russia and Cybercrime: A Balance Between Selective Repression and State Interest
Di Ada Spinelli - 24/10/2025

The Russian cybercrime ecosystem has entered a phase of profound transformation, triggered by a combination of factors: unprecedented international pressure from law enforcement agencies, a shift in d...

Immagine del sito
Hackers can access Microsoft Teams chats and emails using access tokens
Di Redazione RHC - 24/10/2025

A recent discovery has revealed that hackers can exploit a flaw in Microsoft Teams on Windows to obtain encrypted authentication tokens , which grant unauthorized access to chats, emails, and files st...

Immagine del sito
FIA website hacked: personal data of Max Verstappen and over 7,000 drivers exposed
Di Redazione RHC - 24/10/2025

Security researchers have discovered vulnerabilities in an FIA website that contained sensitive personal information and documents relating to drivers, including world champion Max Verstappen. Ian Car...

Data Anonymization: Protecting Privacy Without Losing Utility

In an era where personal data is being produced and shared on a massive, daily basis, the concept of anonymization takes on a central role in the deba...
Aniello Giugliano - 21/10/2025 - 08:03

NIS2 and new ACN guidelines: what changes for companies and how to prepare

The European NIS2 directive represents a turning point for cybersecurity in Italy and Europe, imposing new responsibilities on public and private orga...
Redazione RHC - 21/10/2025 - 07:36

RHC’s HackerHood Reveals Two New 0days on Zyxel Products

Security researcher Alessandro Sgreccia , a member of Red Hot Cyber’s HackerHood team, has reported two new vulnerabilities to Zyxel affecting several...
Redazione RHC - 21/10/2025 - 07:36

F5 BIG-IP Vulnerability: 266,000 Devices at Risk Worldwide! 2,500 in Italy

The Cybersecurity and Infrastructure Security Agency (CISA) and the Multi-State Information Sharing & Analysis Center (MS-ISAC) are issuing this J...
Redazione RHC - 20/10/2025 - 14:44

Amazon Web Services Cloud Outage, Global Issues

A major outage in Amazon Web Services (AWS) cloud services has caused widespread connection issues around the world, affecting major platforms such as...
Redazione RHC - 20/10/2025 - 12:55

Google Announces Gemini 3.0: Artificial Intelligence Evolves Toward AGI

At the Dreamforce conference in San Francisco, Google CEO Sundar Pichai announced that Google will release a new version of its artificial intelligenc...
Redazione RHC - 20/10/2025 - 12:26
1 5 6 7 8 9 205

Data Anonymization: Protecting Privacy Without Losing Utility

- October 21st, 2025

In an era where personal data is being produced and shared on a massive, daily basis, the concept of anonymization takes on a central role in the debate on privacy...

Facebook Linkedin X

NIS2 and new ACN guidelines: what changes for companies and how to prepare

- October 21st, 2025

The European NIS2 directive represents a turning point for cybersecurity in Italy and Europe, imposing new responsibilities on public and private organizations in managing cyber risks. To support the compliance...

Facebook Linkedin X

RHC’s HackerHood Reveals Two New 0days on Zyxel Products

- October 21st, 2025

Security researcher Alessandro Sgreccia , a member of Red Hot Cyber’s HackerHood team, has reported two new vulnerabilities to Zyxel affecting several devices from the ZLD (ATP/USG) family. Alessandro Sgreccia...

Facebook Linkedin X

F5 BIG-IP Vulnerability: 266,000 Devices at Risk Worldwide! 2,500 in Italy

- October 20th, 2025

The Cybersecurity and Infrastructure Security Agency (CISA) and the Multi-State Information Sharing & Analysis Center (MS-ISAC) are issuing this Joint Cybersecurity Advisory (CSA) in response to the active exploitation of...

Facebook Linkedin X

Amazon Web Services Cloud Outage, Global Issues

- October 20th, 2025

A major outage in Amazon Web Services (AWS) cloud services has caused widespread connection issues around the world, affecting major platforms such as Snapchat, Facebook, and Fortnite , along with...

Facebook Linkedin X

Google Announces Gemini 3.0: Artificial Intelligence Evolves Toward AGI

- October 20th, 2025

At the Dreamforce conference in San Francisco, Google CEO Sundar Pichai announced that Google will release a new version of its artificial intelligence, Gemini 3.0 , later this year. The...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE