Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...
EDR-Freeze Arrives! It Puts Windows into a Deep Coma Without Vulnerable Drivers
The DDoS King is here! 40 seconds at 22.2 terabits mitigated by Cloudflare
The Warlock Group: A New Player in the Ransomware Market
Cyberwar in Italy: The government brings the army into cyberspace.
FBI warns of fake websites impersonating IC3 to commit fraud
Apple attacks Google Chrome: “Switch to Safari to protect your privacy.”

EDR-Freeze Arrives! It Puts Windows into a Deep Coma Without Vulnerable Drivers
Redazione RHC - September 22nd, 2025
A Zero Salarium specialist has presented a method that temporarily disables antivirus processes and EDR agents on Windows using built-in system tools. The article details the concept and operational tool,...

The DDoS King is here! 40 seconds at 22.2 terabits mitigated by Cloudflare
Redazione RHC - September 22nd, 2025
Cloudflare has announced that it independently managed an unprecedented Distributed Denial-of-Service (DDoS) attack, the largest ever seen. The hypervolumetric attack reached an unprecedented peak of 22.2 terabits per second (Tbps)...

The Warlock Group: A New Player in the Ransomware Market
Redazione RHC - September 22nd, 2025
The Warlock group, also known as Storm-2603 and GOLD SALEM , has gone from being a newcomer to a major player in the ransomware market in just a few months....

Cyberwar in Italy: The government brings the army into cyberspace.
Paolo Galdieri - September 22nd, 2025
Cyberspace is no longer a marginal dimension but a true strategic operational domain. Its relevance is now comparable to that of land, sea, air, and space. Technological acceleration driven by...

FBI warns of fake websites impersonating IC3 to commit fraud
Redazione RHC - September 22nd, 2025
The FBI has issued a warning : scammers are impersonating the Internet Fraud Complaint Center (IC3) website to commit financial fraud or steal visitors' personal information. "Attackers create fake websites,...

Apple attacks Google Chrome: “Switch to Safari to protect your privacy.”
Redazione RHC - September 22nd, 2025
Apple has issued a stern warning: stop using Google Chrome. The world's most popular browser is competing with both desktops and smartphones, gradually taking market share from Apple. But the...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

