Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...
TikTok, the app setting the US ablaze: billion-dollar deal for total control
Supply Chain: The blockade of European airports raises concerns about an increasingly critical issue.
Dedigitalization: Japanese city of Toyoda restricts smartphone use
ShadowV2: New MaaS botnet for DDoS attacks uses containers
GitHub strengthens npm security against supply chain attacks.
Towards AGI: Google DeepMind warns, AI could ignore humans

TikTok, the app setting the US ablaze: billion-dollar deal for total control
Redazione RHC - September 23rd, 2025
TikTok's fate in the United States is now inextricably linked to political negotiations. The White House has announced that the service's recommendation algorithm will be replicated and adapted solely based...

Supply Chain: The blockade of European airports raises concerns about an increasingly critical issue.
Paolo Galdieri - September 23rd, 2025
On September 20, 2025, a cyberattack hit three of Europe's major airports: London Heathrow, Brussels, and Berlin. The digital systems governing check-in and baggage handling were rendered unusable, resulting in...

Dedigitalization: Japanese city of Toyoda restricts smartphone use
Redazione RHC - September 23rd, 2025
In the Japanese city of Toyoda (Aichi Prefecture), city council members approved a draft ordinance limiting smartphone use during leisure time . The document establishes a daily limit of two...

ShadowV2: New MaaS botnet for DDoS attacks uses containers
Redazione RHC - September 23rd, 2025
Amid growing criminal activity, Darktrace has uncovered a new campaign using the ShadowV2 botnet. Researchers detected malicious activity on June 24, 2025, when their honeypots were activated. This system relies...

GitHub strengthens npm security against supply chain attacks.
Redazione RHC - September 23rd, 2025
GitHub has announced major changes to its npm authentication and publishing system, aimed at strengthening protection against supply chain attacks. The updates were prompted by the recent Shai-Hulud campaign, a...

Towards AGI: Google DeepMind warns, AI could ignore humans
Redazione RHC - September 23rd, 2025
Google DeepMind researchers have released an updated version of their AI risk assessment framework, Frontier Safety Framework 3.0 . This paper examines how generative models can run amok and pose...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

