Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
TM RedHotCyber 320x100 042514
Banner Desktop

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Tor Boosts Security with Counter Galois Onion CGO Encryption
Di Redazione RHC - 27/11/2025

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

Immagine del sito
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Di Redazione RHC - 26/11/2025

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Immagine del sito
Investment Scam Alert: How to Avoid Losing Thousands
Di Redazione RHC - 26/11/2025

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

Immagine del sito
Malware Uses Finger Command to Infect Windows Devices
Di Redazione RHC - 26/11/2025

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

Immagine del sito
The AGI Revolution: How Mark Gubrud’s Term Changed Tech Forever
Di Redazione RHC - 25/11/2025

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...

From Leash to Autonomy: Ban, Nvidia Block, and Huawei’s AI Cluster Solutions

China's Huawei has taken a major step in developing its own artificial intelligence infrastructure. The company has unveiled solutions designed to inc...
Redazione RHC - 22/09/2025 - 07:25

Discipline your email first so you don’t regret it later

Managing employee email inboxes is often overlooked by organizations, despite the widespread use of email and its significant impact on privacy and se...
Stefano Gazzella - 22/09/2025 - 07:17

Mathematical Security: From Number Theory to Hacking and Pentesting

When we talk about cybersecurity, we immediately think of firewalls, malware, and zero-day exploits. But there's a deeper level, unseen and unsurpasse...
Diego Bentivoglio - 22/09/2025 - 07:03

Elon Musk unveils Colossus II, the one-gigawatt AI supercomputer

Elon Musk shared a photo of the complex housing Colossus II, the world's first gigawatt-scale AI cluster. Elon Musk has previously stated that the Col...
Redazione RHC - 22/09/2025 - 06:54

Vulnerability in Windows RPC protocol: Spoofing and impersonation attacks reported

SafeBreach experts have disclosed details of a vulnerability in the Windows Remote Procedure Call (RPC) protocol, patched by Microsoft in the July 202...
Redazione RHC - 21/09/2025 - 20:57

Patchwork Launches Spear-Phishing Campaign Against Turkish Defense

The Patchwork group, also known by the aliases APT-C-09, APT-Q-36, Chinastrats, Dropping Elephant, Operation Hangover, Quilted Tiger, and Zinc Emerson...
Redazione RHC - 21/09/2025 - 20:53

From Leash to Autonomy: Ban, Nvidia Block, and Huawei’s AI Cluster Solutions

- September 21st, 2025

China's Huawei has taken a major step in developing its own artificial intelligence infrastructure. The company has unveiled solutions designed to increase computing power and reduce dependence on foreign technologies...

Facebook Linkedin X

Discipline your email first so you don’t regret it later

- September 21st, 2025

Managing employee email inboxes is often overlooked by organizations, despite the widespread use of email and its significant impact on privacy and security . Despite being a work tool, an...

Facebook Linkedin X

Mathematical Security: From Number Theory to Hacking and Pentesting

- September 21st, 2025

When we talk about cybersecurity, we immediately think of firewalls, malware, and zero-day exploits. But there's a deeper level, unseen and unsurpassed: the laws of mathematics. Because while software can...

Facebook Linkedin X

Elon Musk unveils Colossus II, the one-gigawatt AI supercomputer

- September 21st, 2025

Elon Musk shared a photo of the complex housing Colossus II, the world's first gigawatt-scale AI cluster. Elon Musk has previously stated that the Colossus 2 supercomputer, developed by xAI,...

Facebook Linkedin X

Vulnerability in Windows RPC protocol: Spoofing and impersonation attacks reported

- September 20th, 2025

SafeBreach experts have disclosed details of a vulnerability in the Windows Remote Procedure Call (RPC) protocol, patched by Microsoft in the July 2025 update. The flaw, CVE-2025-49760, allowed an attacker...

Facebook Linkedin X

Bandiera turchia

Patchwork Launches Spear-Phishing Campaign Against Turkish Defense

- September 20th, 2025

The Patchwork group, also known by the aliases APT-C-09, APT-Q-36, Chinastrats, Dropping Elephant, Operation Hangover, Quilted Tiger, and Zinc Emerson , has launched a new spear-phishing campaign targeting the Turkish...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE