Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...
A social network made entirely of bots! The University of Amsterdam experiment
DeepSeek under fire: 50% of malicious code produced on sensitive queries
Russian influence network CopyCop creates over 300 websites to spread disinformation
A former CIA agent sold state secrets for personal gain
Microsoft launches its “AI factory”: the most powerful supercomputer ever built.
Critical vulnerability in Microsoft Login ID: risk of total takeover

A social network made entirely of bots! The University of Amsterdam experiment
Redazione RHC - September 19th, 2025
Researchers at the University of Amsterdam conducted a novel experiment, creating a social network populated exclusively by artificial intelligence bots. The primary objective was to analyze how digital dynamics could...

DeepSeek under fire: 50% of malicious code produced on sensitive queries
Redazione RHC - September 19th, 2025
Specialists at CrowdStrike conducted a series of experiments with the Chinese artificial intelligence system DeepSeek, testing its code generation based on query terms. They found that the results directly depended...

Russian influence network CopyCop creates over 300 websites to spread disinformation
Redazione RHC - September 19th, 2025
Since March 2025, Insikt Group of Recorded Future observed CopyCop (also known as Storm-1516), a covert Russian influence network, creating at least 200 new fake media websites targeting the United...

A former CIA agent sold state secrets for personal gain
Redazione RHC - September 19th, 2025
Former CIA agent Dale Britt Bandler is at the center of a high-profile criminal case: he used his access to the agency's top-secret systems, turning them into a "personal Google"...

Microsoft launches its “AI factory”: the most powerful supercomputer ever built.
Redazione RHC - September 18th, 2025
Microsoft has unveiled a new generation of data centers designed specifically for artificial intelligence. The flagship facility is called Microsoft Fairwater and is located in Wisconsin. It is the company's...

Critical vulnerability in Microsoft Login ID: risk of total takeover
Redazione RHC - September 18th, 2025
Microsoft has closed a critical bug that could have severely compromised its cloud environments: Dutch researcher Dirk-Jan Mollema discovered two interconnected flaws in the Entra ID (formerly Azure Active Directory)...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

