Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Fortinet 320x100px
Crowdstriker 970×120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Tor Boosts Security with Counter Galois Onion CGO Encryption
Di Redazione RHC - 27/11/2025

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

Immagine del sito
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Di Redazione RHC - 26/11/2025

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Immagine del sito
Investment Scam Alert: How to Avoid Losing Thousands
Di Redazione RHC - 26/11/2025

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

Immagine del sito
Malware Uses Finger Command to Infect Windows Devices
Di Redazione RHC - 26/11/2025

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

Immagine del sito
The AGI Revolution: How Mark Gubrud’s Term Changed Tech Forever
Di Redazione RHC - 25/11/2025

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...

Hackers don’t want to save you: they want to erase you.

Hackers are increasingly targeting backups – not systems or servers, but the data that companies retain for a limited period of time so they can recov...
Redazione RHC - 21/09/2025 - 11:37

The Story of Microsoft Solitaire: From Launch with Windows 3.0 to Enduring Success

Microsoft first released Solitaire in 1990 with Windows 3.0, as a tool to familiarize users with the graphical interface and mouse use. The game was c...
Redazione RHC - 21/09/2025 - 10:09

Removing private data from AI models? Now you can without accessing the original datasets.

A team from the University of California, Riverside, has demonstrated a new way to remove private and copyrighted data from AI models without accessin...
Redazione RHC - 21/09/2025 - 10:02

Edge vs. Chrome: Microsoft promotes its browser with aggressive ads on Bing

Microsoft has once again launched an aggressive campaign for its proprietary Edge browser. This time, the software giant is displaying a comprehensive...
Redazione RHC - 21/09/2025 - 09:56

Will Nvidia’s robotic brain revolutionize artificial intelligence and robotics?

On August 24, the official Nvidia Robotics account shared an image on social media of a black gift box accompanied by a greeting card signed by founde...
Redazione RHC - 21/09/2025 - 09:55

Qilin leads ransomware attacks as new groups emerge underground

Qilin continues to lead the way among all active crypto attack groups, significantly lagging behind its competitors in the number of reported incident...
Redazione RHC - 21/09/2025 - 09:13

Hackers don’t want to save you: they want to erase you.

- September 20th, 2025

Hackers are increasingly targeting backups – not systems or servers, but the data that companies retain for a limited period of time so they can recover from attacks. A new...

Facebook Linkedin X

The Story of Microsoft Solitaire: From Launch with Windows 3.0 to Enduring Success

- September 20th, 2025

Microsoft first released Solitaire in 1990 with Windows 3.0, as a tool to familiarize users with the graphical interface and mouse use. The game was created by Wes Cherry, with...

Facebook Linkedin X

Removing private data from AI models? Now you can without accessing the original datasets.

- September 20th, 2025

A team from the University of California, Riverside, has demonstrated a new way to remove private and copyrighted data from AI models without accessing the original datasets. The solution addresses...

Facebook Linkedin X

Edge vs. Chrome: Microsoft promotes its browser with aggressive ads on Bing

- September 20th, 2025

Microsoft has once again launched an aggressive campaign for its proprietary Edge browser. This time, the software giant is displaying a comprehensive comparison table between Edge and Chrome directly on...

Facebook Linkedin X

Will Nvidia’s robotic brain revolutionize artificial intelligence and robotics?

- September 20th, 2025

On August 24, the official Nvidia Robotics account shared an image on social media of a black gift box accompanied by a greeting card signed by founder Jensen Huang, with...

Facebook Linkedin X

Qilin leads ransomware attacks as new groups emerge underground

- September 20th, 2025

Qilin continues to lead the way among all active crypto attack groups, significantly lagging behind its competitors in the number of reported incidents. According to a recent Cyble report, the...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE