Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...
Google Chrome: Urgent patch for exploited 0day. Critical vulnerabilities fixed.
Phishing with style! Cybercriminals attach superhero GIFs to malware.
Will this latest article “against” ChatControl be absolutely useless?
Azure Functions in the Spotlight: Legitimate Libraries Used for DLL Sideloading
Linux Hit by Sindoor Dropper: Highly Obfuscated Infection Chain
A manifesto after 72 hours! Will cybercriminals really retreat?

Google Chrome: Urgent patch for exploited 0day. Critical vulnerabilities fixed.
Redazione RHC - September 17th, 2025
Google has taken immediate security action for Chrome browser users globally, targeting four critical vulnerabilities, one of which, a zero-day vulnerability, is currently being actively exploited. Users are therefore urged...

Phishing with style! Cybercriminals attach superhero GIFs to malware.
Redazione RHC - September 17th, 2025
F6 analysts have published a study on a new phishing campaign active from spring 2025. The group, dubbed ComicForm, sent emails containing malicious attachments to Russian, Belarusian, and Kazakh companies...

Will this latest article “against” ChatControl be absolutely useless?
Stefano Gazzella - September 17th, 2025
We had already discussed the proposed "ChatControl" regulation almost two years ago, but given the roadmap currently underway, we find ourselves embarrassed to have to discuss it again. It feels...

Azure Functions in the Spotlight: Legitimate Libraries Used for DLL Sideloading
Redazione RHC - September 17th, 2025
A malicious version of the ISO image named Servicenow-BNM-Verify.iso has been identified on VirusTotal, reported as originating from Malaysia, with virtually no detection. The image contains four files, two visible...

Linux Hit by Sindoor Dropper: Highly Obfuscated Infection Chain
Redazione RHC - September 17th, 2025
Linux systems are being targeted by a recent malware campaign, known as "Sindoor Dropper," which uses advanced spear-phishing techniques and a complex infection process. Victims are tricked with lures related...

A manifesto after 72 hours! Will cybercriminals really retreat?
Redazione RHC - September 17th, 2025
Fifteen of the most notorious cybercriminal groups, including Scattered Spider, ShinyHunters, and Lapsus$, have announced their closure. Their collective statement, published on BreachForums, is the most explicit message from the...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

