Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Banner Ransomfeed 320x100 1
Banner Ancharia Desktop 1 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Tor Boosts Security with Counter Galois Onion CGO Encryption
Di Redazione RHC - 27/11/2025

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

Immagine del sito
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Di Redazione RHC - 26/11/2025

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Immagine del sito
Investment Scam Alert: How to Avoid Losing Thousands
Di Redazione RHC - 26/11/2025

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

Immagine del sito
Malware Uses Finger Command to Infect Windows Devices
Di Redazione RHC - 26/11/2025

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

Immagine del sito
The AGI Revolution: How Mark Gubrud’s Term Changed Tech Forever
Di Redazione RHC - 25/11/2025

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...

ShinyHunters violates Gucci, Balenciaga, and Alexander McQueen: $7.4 million worth of records exposed

Kering, the luxury and fashion giant, has officially announced that a data breach was perpetrated against customers of its leading brands, including G...
Redazione RHC - 17/09/2025 - 10:31

RHC interviews ShinyHunters: “Systems can be repaired, but people remain vulnerable!”

ShinyHunters is a group of threat actors that gained notoriety after the massive data breach against Salesforce, an incident that led Google to closel...
RHC Dark Lab - 17/09/2025 - 10:18

Perl returns to the top 10 most popular programming languages

TIOBE Software has released its September ranking of the most popular programming languages. The highlight of the publication was Perl's return to the...
Redazione RHC - 17/09/2025 - 07:21

Hacker Scattered LAPSUS$ Hunters: Unauthorized Access to Google LERS

Google executives said that hackers created a fake account on the Law Enforcement Request System (LERS), the company's platform used by law enforcemen...
Redazione RHC - 17/09/2025 - 06:55

Chat Control: Between hunting down illegal channels and cracking down on freedom and privacy

The news is simple, the technology is not. Chat Control (CSAR) was created to uncover CSAM and grooming dynamics within messaging platforms. The "mode...
Sandro Sana - 16/09/2025 - 14:39

An e-cigarette becomes a web server. And let hacking be!

Richard Stallman said many years ago "Playfully doing something difficult, whether it's useful or not, that's hacking!" Romanian engineer and origa...
Redazione RHC - 16/09/2025 - 14:29

ShinyHunters violates Gucci, Balenciaga, and Alexander McQueen: $7.4 million worth of records exposed

- September 16th, 2025

Kering, the luxury and fashion giant, has officially announced that a data breach was perpetrated against customers of its leading brands, including Gucci, Balenciaga, and Alexander McQueen. ShinyHunters, the same...

Facebook Linkedin X

RHC interviews ShinyHunters: “Systems can be repaired, but people remain vulnerable!”

- September 16th, 2025

ShinyHunters is a group of threat actors that gained notoriety after the massive data breach against Salesforce, an incident that led Google to closely monitor them and assign them the...

Facebook Linkedin X

Perl returns to the top 10 most popular programming languages

- September 16th, 2025

TIOBE Software has released its September ranking of the most popular programming languages. The highlight of the publication was Perl's return to the top 10, jumping from 27th to 10th...

Facebook Linkedin X

Hacker Scattered LAPSUS$ Hunters: Unauthorized Access to Google LERS

- September 16th, 2025

Google executives said that hackers created a fake account on the Law Enforcement Request System (LERS), the company's platform used by law enforcement agencies to submit official data requests. Late...

Facebook Linkedin X

Chat Control: Between hunting down illegal channels and cracking down on freedom and privacy

- September 15th, 2025

The news is simple, the technology is not. Chat Control (CSAR) was created to uncover CSAM and grooming dynamics within messaging platforms. The "modernized" version forgoes the server-side backdoor and...

Facebook Linkedin X

An e-cigarette becomes a web server. And let hacking be!

- September 15th, 2025

Richard Stallman said many years ago "Playfully doing something difficult, whether it's useful or not, that's hacking!" Romanian engineer and origami master Bogdan Ionescu, known by the nickname BogdanTheGeek, has...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE