Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...
From Debugging to Breaking: Turning Crash Dumps into EDR Kill Switches
RAN Hacking: US Intelligence Uncovers Clandestine Cellular Network in New York
Chrome for Android: From a “wall of text” to a podcast is a short step.
Developers safe: Mozilla introduces Firefox extension rollback feature.
$50 Deepfakes: The New Darknet Business Concerns Cybersecurity
ClickFix: The Scam That Tricks Mac Users into Installing the AMOS Trojan

From Debugging to Breaking: Turning Crash Dumps into EDR Kill Switches
Alex Necula - September 23rd, 2025
I have been working for several years as a System Engineer, and one of the tasks I handled was managing Citrix PVS. One of the issues with PVS was investigating...

RAN Hacking: US Intelligence Uncovers Clandestine Cellular Network in New York
Redazione RHC - September 22nd, 2025
U.S. intelligence agencies have reported discovering and seizing a network of telecommunications equipment in the New York area capable of disrupting mobile phone service. The devices were located near the...

Chrome for Android: From a “wall of text” to a podcast is a short step.
Redazione RHC - September 22nd, 2025
Google has added a new AI-powered feature to Chrome for Android for reading web pages. Instead of reading the entire text aloud, the browser can summarize the material in a...

Developers safe: Mozilla introduces Firefox extension rollback feature.
Redazione RHC - September 22nd, 2025
Mozilla has introduced a new feature for Firefox add-on developers that allows them to quickly revert to a previously approved version and fix critical issues in situations where fixing and...

$50 Deepfakes: The New Darknet Business Concerns Cybersecurity
Redazione RHC - September 22nd, 2025
Kaspersky Lab researchers have discovered advertisements on the darknet offering the ability to create video and audio deepfakes in real time . The price of this service depends on the...

ClickFix: The Scam That Tricks Mac Users into Installing the AMOS Trojan
Redazione RHC - September 22nd, 2025
Cybercriminals have launched a large-scale campaign against macOS users, disguising malware as popular programs. LastPass reported this, having discovered that its product had also been spoofed . The malware is...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

