Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Banner Ransomfeed 320x100 1
Fortinet 970x120px

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Tor Boosts Security with Counter Galois Onion CGO Encryption
Di Redazione RHC - 27/11/2025

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

Immagine del sito
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Di Redazione RHC - 26/11/2025

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Immagine del sito
Investment Scam Alert: How to Avoid Losing Thousands
Di Redazione RHC - 26/11/2025

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

Immagine del sito
Malware Uses Finger Command to Infect Windows Devices
Di Redazione RHC - 26/11/2025

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

Immagine del sito
The AGI Revolution: How Mark Gubrud’s Term Changed Tech Forever
Di Redazione RHC - 25/11/2025

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...

Google Chrome: Urgent patch for exploited 0day. Critical vulnerabilities fixed.

Google has taken immediate security action for Chrome browser users globally, targeting four critical vulnerabilities, one of which, a zero-day vulner...
Redazione RHC - 18/09/2025 - 10:01

Phishing with style! Cybercriminals attach superhero GIFs to malware.

F6 analysts have published a study on a new phishing campaign active from spring 2025. The group, dubbed ComicForm, sent emails containing malicious a...
Redazione RHC - 18/09/2025 - 09:47

Will this latest article “against” ChatControl be absolutely useless?

We had already discussed the proposed "ChatControl" regulation almost two years ago, but given the roadmap currently underway, we find ourselves embar...
Stefano Gazzella - 18/09/2025 - 08:00

Azure Functions in the Spotlight: Legitimate Libraries Used for DLL Sideloading

A malicious version of the ISO image named Servicenow-BNM-Verify.iso has been identified on VirusTotal, reported as originating from Malaysia, with vi...
Redazione RHC - 18/09/2025 - 07:50

Linux Hit by Sindoor Dropper: Highly Obfuscated Infection Chain

Linux systems are being targeted by a recent malware campaign, known as "Sindoor Dropper," which uses advanced spear-phishing techniques and a complex...
Redazione RHC - 18/09/2025 - 07:28

A manifesto after 72 hours! Will cybercriminals really retreat?

Fifteen of the most notorious cybercriminal groups, including Scattered Spider, ShinyHunters, and Lapsus$, have announced their closure. Their collect...
Redazione RHC - 18/09/2025 - 07:12

Google Chrome: Urgent patch for exploited 0day. Critical vulnerabilities fixed.

- September 17th, 2025

Google has taken immediate security action for Chrome browser users globally, targeting four critical vulnerabilities, one of which, a zero-day vulnerability, is currently being actively exploited. Users are therefore urged...

Facebook Linkedin X

Phishing with style! Cybercriminals attach superhero GIFs to malware.

- September 17th, 2025

F6 analysts have published a study on a new phishing campaign active from spring 2025. The group, dubbed ComicForm, sent emails containing malicious attachments to Russian, Belarusian, and Kazakh companies...

Facebook Linkedin X

Will this latest article “against” ChatControl be absolutely useless?

- September 17th, 2025

We had already discussed the proposed "ChatControl" regulation almost two years ago, but given the roadmap currently underway, we find ourselves embarrassed to have to discuss it again. It feels...

Facebook Linkedin X

Azure Functions in the Spotlight: Legitimate Libraries Used for DLL Sideloading

- September 17th, 2025

A malicious version of the ISO image named Servicenow-BNM-Verify.iso has been identified on VirusTotal, reported as originating from Malaysia, with virtually no detection. The image contains four files, two visible...

Facebook Linkedin X

Linux Hit by Sindoor Dropper: Highly Obfuscated Infection Chain

- September 17th, 2025

Linux systems are being targeted by a recent malware campaign, known as "Sindoor Dropper," which uses advanced spear-phishing techniques and a complex infection process. Victims are tricked with lures related...

Facebook Linkedin X

A manifesto after 72 hours! Will cybercriminals really retreat?

- September 17th, 2025

Fifteen of the most notorious cybercriminal groups, including Scattered Spider, ShinyHunters, and Lapsus$, have announced their closure. Their collective statement, published on BreachForums, is the most explicit message from the...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE