Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...
RevengeHotels Improves VenomRAT with Artificial Intelligence
Security Alert: Vulnerability in Ivanti Endpoint Manager Mobile. CISA Warns
Root in less than two minutes: How Phoenix exploits vulnerabilities in DDR5 module TRRs.
China kicks off the race for innovation with its first AI competition
A major cyberattack hits European airports. Flights grounded.
Submarine Cables: Japan Declares War on Chinese Suppliers

RevengeHotels Improves VenomRAT with Artificial Intelligence
Redazione RHC - September 20th, 2025
Kaspersky Lab experts have detected a new wave of attacks by the RevengeHotels group. A distinctive feature of this campaign is that many of the new malware samples were created...

Security Alert: Vulnerability in Ivanti Endpoint Manager Mobile. CISA Warns
Redazione RHC - September 20th, 2025
The U.S. Cybersecurity Agency (CISA) has issued an alert regarding two malware kits discovered on the network of an unidentified organization after exploiting new vulnerabilities in the Ivanti Endpoint Manager...

Root in less than two minutes: How Phoenix exploits vulnerabilities in DDR5 module TRRs.
Redazione RHC - September 19th, 2025
Anew variant of Rowhammer attacks has been developed that can bypass the latest security mechanisms in SK Hynix DDR5 chips. Dubbed Phoenix, the attack allows root access to DDR5-based systems...

China kicks off the race for innovation with its first AI competition
Redazione RHC - September 19th, 2025
The city of Karamay, Xinjiang, hosted the opening of the finals and exhibition of the first AI Applications Competition. The event, held at the Museum of Science and Technology, saw...

A major cyberattack hits European airports. Flights grounded.
Redazione RHC - September 19th, 2025
On Saturday, September 20, 2025, a cyberattack hit a service provider used by several European airports, including Brussels, Berlin, and London Heathrow. The incident caused significant disruption, with flight delays...

Submarine Cables: Japan Declares War on Chinese Suppliers
Redazione RHC - September 19th, 2025
After the United States decided to restrict access to undersea communications cables using Chinese technology, Japan also initiated a plan to inspect its own connections. The investigation aims to verify...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

