Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
2nd Edition GlitchZone RHC 320x100 2
Banner Ransomfeed 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Tor Boosts Security with Counter Galois Onion CGO Encryption
Di Redazione RHC - 27/11/2025

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

Immagine del sito
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Di Redazione RHC - 26/11/2025

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Immagine del sito
Investment Scam Alert: How to Avoid Losing Thousands
Di Redazione RHC - 26/11/2025

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

Immagine del sito
Malware Uses Finger Command to Infect Windows Devices
Di Redazione RHC - 26/11/2025

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

Immagine del sito
The AGI Revolution: How Mark Gubrud’s Term Changed Tech Forever
Di Redazione RHC - 25/11/2025

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...

A social network made entirely of bots! The University of Amsterdam experiment

Researchers at the University of Amsterdam conducted a novel experiment, creating a social network populated exclusively by artificial intelligence bo...
Redazione RHC - 20/09/2025 - 09:36

DeepSeek under fire: 50% of malicious code produced on sensitive queries

Specialists at CrowdStrike conducted a series of experiments with the Chinese artificial intelligence system DeepSeek, testing its code generation ba...
Redazione RHC - 20/09/2025 - 09:12

Russian influence network CopyCop creates over 300 websites to spread disinformation

Since March 2025, Insikt Group of Recorded Future observed CopyCop (also known as Storm-1516), a covert Russian influence network, creating at least 2...
Redazione RHC - 20/09/2025 - 08:45

A former CIA agent sold state secrets for personal gain

Former CIA agent Dale Britt Bandler is at the center of a high-profile criminal case: he used his access to the agency's top-secret systems, turning t...
Redazione RHC - 20/09/2025 - 08:18

Microsoft launches its “AI factory”: the most powerful supercomputer ever built.

Microsoft has unveiled a new generation of data centers designed specifically for artificial intelligence. The flagship facility is called Microsoft F...
Redazione RHC - 19/09/2025 - 17:50

Critical vulnerability in Microsoft Login ID: risk of total takeover

Microsoft has closed a critical bug that could have severely compromised its cloud environments: Dutch researcher Dirk-Jan Mollema discovered two inte...
Redazione RHC - 19/09/2025 - 15:47

A social network made entirely of bots! The University of Amsterdam experiment

- September 19th, 2025

Researchers at the University of Amsterdam conducted a novel experiment, creating a social network populated exclusively by artificial intelligence bots. The primary objective was to analyze how digital dynamics could...

Facebook Linkedin X

DeepSeek under fire: 50% of malicious code produced on sensitive queries

- September 19th, 2025

Specialists at CrowdStrike conducted a series of experiments with the Chinese artificial intelligence system DeepSeek, testing its code generation based on query terms. They found that the results directly depended...

Facebook Linkedin X

Russian influence network CopyCop creates over 300 websites to spread disinformation

- September 19th, 2025

Since March 2025, Insikt Group of Recorded Future observed CopyCop (also known as Storm-1516), a covert Russian influence network, creating at least 200 new fake media websites targeting the United...

Facebook Linkedin X

A former CIA agent sold state secrets for personal gain

- September 19th, 2025

Former CIA agent Dale Britt Bandler is at the center of a high-profile criminal case: he used his access to the agency's top-secret systems, turning them into a "personal Google"...

Facebook Linkedin X

Microsoft launches its “AI factory”: the most powerful supercomputer ever built.

- September 18th, 2025

Microsoft has unveiled a new generation of data centers designed specifically for artificial intelligence. The flagship facility is called Microsoft Fairwater and is located in Wisconsin. It is the company's...

Facebook Linkedin X

Critical vulnerability in Microsoft Login ID: risk of total takeover

- September 18th, 2025

Microsoft has closed a critical bug that could have severely compromised its cloud environments: Dutch researcher Dirk-Jan Mollema discovered two interconnected flaws in the Entra ID (formerly Azure Active Directory)...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE