Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...
Kali Linux 2025.3 is out! A new release with improvements and new tools.
CrowdStrike: Cybersecurity Enters the Age of AI Agents
Critical bug in Salesforce CLI: Arbitrary code execution and SYSTEM access
Google Chrome Zero-Day Vulnerability: CISA Warns and Files Bug on KEV
Violent social media and video games: the new ticking time bomb for teens.
WhatsApp introduces in-app message translation

Kali Linux 2025.3 is out! A new release with improvements and new tools.
Redazione RHC - September 23rd, 2025
Kali Linux developers have released a new release, 2025.3 , which expands the distribution's functionality and adds ten new penetration testing tools. The update improves deployment processes in virtual environments,...

CrowdStrike: Cybersecurity Enters the Age of AI Agents
Marcello Filacchioni - September 23rd, 2025
At Fal.Con 2025, the annual conference that brings together thousands of cybersecurity experts from around the world, CrowdStrike made one thing clear: cyber defense is entering a new era, that...

Critical bug in Salesforce CLI: Arbitrary code execution and SYSTEM access
Redazione RHC - September 23rd, 2025
A critical vulnerability in the Salesforce CLI installer (sf-x64.exe) allows attackers to gain arbitrary code execution, privilege escalation, and SYSTEM-level access on Windows systems. The vulnerability exploits the way the...

Google Chrome Zero-Day Vulnerability: CISA Warns and Files Bug on KEV
Redazione RHC - September 23rd, 2025
The United States has received an alert from the Cybersecurity and Infrastructure Security Agency (CISA) regarding a highly critical zero-day flaw in Google Chrome, which is currently being exploited in...

Violent social media and video games: the new ticking time bomb for teens.
Redazione RHC - September 23rd, 2025
The uncontrolled use of social media and violent video games poses a growing threat to adolescents at a crucial stage of their development. Child and adolescent health experts warn that...

WhatsApp introduces in-app message translation
Redazione RHC - September 23rd, 2025
WhatsApp has announced a new feature that allows for in-app message translation . The company emphasizes that language barriers often limit free communication, considering its service is used daily by...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

