Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...
Hackers don’t want to save you: they want to erase you.
The Story of Microsoft Solitaire: From Launch with Windows 3.0 to Enduring Success
Removing private data from AI models? Now you can without accessing the original datasets.
Edge vs. Chrome: Microsoft promotes its browser with aggressive ads on Bing
Will Nvidia’s robotic brain revolutionize artificial intelligence and robotics?
Qilin leads ransomware attacks as new groups emerge underground

Hackers don’t want to save you: they want to erase you.
Redazione RHC - September 20th, 2025
Hackers are increasingly targeting backups – not systems or servers, but the data that companies retain for a limited period of time so they can recover from attacks. A new...

The Story of Microsoft Solitaire: From Launch with Windows 3.0 to Enduring Success
Redazione RHC - September 20th, 2025
Microsoft first released Solitaire in 1990 with Windows 3.0, as a tool to familiarize users with the graphical interface and mouse use. The game was created by Wes Cherry, with...

Removing private data from AI models? Now you can without accessing the original datasets.
Redazione RHC - September 20th, 2025
A team from the University of California, Riverside, has demonstrated a new way to remove private and copyrighted data from AI models without accessing the original datasets. The solution addresses...

Edge vs. Chrome: Microsoft promotes its browser with aggressive ads on Bing
Redazione RHC - September 20th, 2025
Microsoft has once again launched an aggressive campaign for its proprietary Edge browser. This time, the software giant is displaying a comprehensive comparison table between Edge and Chrome directly on...

Will Nvidia’s robotic brain revolutionize artificial intelligence and robotics?
Redazione RHC - September 20th, 2025
On August 24, the official Nvidia Robotics account shared an image on social media of a black gift box accompanied by a greeting card signed by founder Jensen Huang, with...

Qilin leads ransomware attacks as new groups emerge underground
Redazione RHC - September 20th, 2025
Qilin continues to lead the way among all active crypto attack groups, significantly lagging behind its competitors in the number of reported incidents. According to a recent Cyble report, the...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

