Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Banner Ancharia Mobile 1
Crowdstriker 970×120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Tor Boosts Security with Counter Galois Onion CGO Encryption
Di Redazione RHC - 27/11/2025

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

Immagine del sito
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Di Redazione RHC - 26/11/2025

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Immagine del sito
Investment Scam Alert: How to Avoid Losing Thousands
Di Redazione RHC - 26/11/2025

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

Immagine del sito
Malware Uses Finger Command to Infect Windows Devices
Di Redazione RHC - 26/11/2025

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

Immagine del sito
The AGI Revolution: How Mark Gubrud’s Term Changed Tech Forever
Di Redazione RHC - 25/11/2025

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...

ENISA takes on the role of Root in the European Cybersecurity Initiative (CVE).

The European Union Agency for Cybersecurity (ENISA) has taken on the role of Root within the Common Vulnerabilities and Exposures (CVE) programme, bec...
Redazione RHC - 27/11/2025 - 10:57

Supply Chain Attack on OpenAI: Analytics Provider Mixpanel Compromised

OpenAI has confirmed a security incident at Mixpanel, a third-party analytics provider used for its APIs. According to the investigation, the cause of...
Redazione RHC - 27/11/2025 - 10:30

Be careful when using SSDs! Without power, you risk data loss

XDA Developers reminds us that using solid-state drives for long-term storage is risky. If SSDs are left without power for years, data can become corr...
Redazione RHC - 27/11/2025 - 09:26

Quantum Computing vs. Artificial Intelligence: Which Will Really Change the Future?

Quantum mechanics remains a complex and mysterious field, both difficult to explain and difficult to understand. This branch of physics studies the un...
Redazione RHC - 27/11/2025 - 07:29

ToddyCat APT Group Targets Microsoft 365 Email Security

Email security continues to be one of the most critical points in modern cyber attacks. While compromising a Windows domain is already a success for a...
Redazione RHC - 27/11/2025 - 06:55

Tor Boosts Security with Counter Galois Onion CGO Encryption

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 R...
Redazione RHC - 27/11/2025 - 06:54
1 2 3 256

ENISA takes on the role of Root in the European Cybersecurity Initiative (CVE).

- November 26th, 2025

The European Union Agency for Cybersecurity (ENISA) has taken on the role of Root within the Common Vulnerabilities and Exposures (CVE) programme, becoming the main point of reference for national...

Facebook Linkedin X

Supply Chain Attack on OpenAI: Analytics Provider Mixpanel Compromised

- November 26th, 2025

OpenAI has confirmed a security incident at Mixpanel, a third-party analytics provider used for its APIs. According to the investigation, the cause of the security incident involving OpenAI and Mixpanel...

Facebook Linkedin X

Be careful when using SSDs! Without power, you risk data loss

- November 26th, 2025

XDA Developers reminds us that using solid-state drives for long-term storage is risky. If SSDs are left without power for years, data can become corrupted or even disappear entirely. Unlike...

Facebook Linkedin X

Quantum Computing vs. Artificial Intelligence: Which Will Really Change the Future?

- November 26th, 2025

Quantum mechanics remains a complex and mysterious field, both difficult to explain and difficult to understand. This branch of physics studies the unusual behavior of tiny particles, phenomena that are...

Facebook Linkedin X

ToddyCat APT Group Targets Microsoft 365 Email Security

- November 26th, 2025

Email security continues to be one of the most critical points in modern cyber attacks. While compromising a Windows domain is already a success for a malicious actor, gaining access...

Facebook Linkedin X

Tor Boosts Security with Counter Galois Onion CGO Encryption

- November 26th, 2025

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE