Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Redhotcyber Banner Sito 320x100px Uscita 101125
LECS 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Tor Boosts Security with Counter Galois Onion CGO Encryption
Di Redazione RHC - 27/11/2025

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

Immagine del sito
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Di Redazione RHC - 26/11/2025

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Immagine del sito
Investment Scam Alert: How to Avoid Losing Thousands
Di Redazione RHC - 26/11/2025

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

Immagine del sito
Malware Uses Finger Command to Infect Windows Devices
Di Redazione RHC - 26/11/2025

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

Immagine del sito
The AGI Revolution: How Mark Gubrud’s Term Changed Tech Forever
Di Redazione RHC - 25/11/2025

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...

Kali Linux 2025.3 is out! A new release with improvements and new tools.

Kali Linux developers have released a new release, 2025.3 , which expands the distribution's functionality and adds ten new penetration testing tools....
Redazione RHC - 24/09/2025 - 21:14

CrowdStrike: Cybersecurity Enters the Age of AI Agents

At Fal.Con 2025, the annual conference that brings together thousands of cybersecurity experts from around the world, CrowdStrike made one thing clear...
Marcello Filacchioni - 24/09/2025 - 18:05

Critical bug in Salesforce CLI: Arbitrary code execution and SYSTEM access

A critical vulnerability in the Salesforce CLI installer (sf-x64.exe) allows attackers to gain arbitrary code execution, privilege escalation, and SYS...
Redazione RHC - 24/09/2025 - 17:17

Google Chrome Zero-Day Vulnerability: CISA Warns and Files Bug on KEV

The United States has received an alert from the Cybersecurity and Infrastructure Security Agency (CISA) regarding a highly critical zero-day flaw in ...
Redazione RHC - 24/09/2025 - 16:01

Violent social media and video games: the new ticking time bomb for teens.

The uncontrolled use of social media and violent video games poses a growing threat to adolescents at a crucial stage of their development. Child and ...
Redazione RHC - 24/09/2025 - 12:53

WhatsApp introduces in-app message translation

WhatsApp has announced a new feature that allows for in-app message translation . The company emphasizes that language barriers often limit free commu...
Redazione RHC - 24/09/2025 - 12:42
1 98 99 100 101 102 256

Kali Linux 2025.3 is out! A new release with improvements and new tools.

- September 23rd, 2025

Kali Linux developers have released a new release, 2025.3 , which expands the distribution's functionality and adds ten new penetration testing tools. The update improves deployment processes in virtual environments,...

Facebook Linkedin X

CrowdStrike: Cybersecurity Enters the Age of AI Agents

- September 23rd, 2025

At Fal.Con 2025, the annual conference that brings together thousands of cybersecurity experts from around the world, CrowdStrike made one thing clear: cyber defense is entering a new era, that...

Facebook Linkedin X

Critical bug in Salesforce CLI: Arbitrary code execution and SYSTEM access

- September 23rd, 2025

A critical vulnerability in the Salesforce CLI installer (sf-x64.exe) allows attackers to gain arbitrary code execution, privilege escalation, and SYSTEM-level access on Windows systems. The vulnerability exploits the way the...

Facebook Linkedin X

Google Chrome Zero-Day Vulnerability: CISA Warns and Files Bug on KEV

- September 23rd, 2025

The United States has received an alert from the Cybersecurity and Infrastructure Security Agency (CISA) regarding a highly critical zero-day flaw in Google Chrome, which is currently being exploited in...

Facebook Linkedin X

Violent social media and video games: the new ticking time bomb for teens.

- September 23rd, 2025

The uncontrolled use of social media and violent video games poses a growing threat to adolescents at a crucial stage of their development. Child and adolescent health experts warn that...

Facebook Linkedin X

WhatsApp introduces in-app message translation

- September 23rd, 2025

WhatsApp has announced a new feature that allows for in-app message translation . The company emphasizes that language barriers often limit free communication, considering its service is used daily by...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE