Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...
ShinyHunters violates Gucci, Balenciaga, and Alexander McQueen: $7.4 million worth of records exposed
RHC interviews ShinyHunters: “Systems can be repaired, but people remain vulnerable!”
Perl returns to the top 10 most popular programming languages
Hacker Scattered LAPSUS$ Hunters: Unauthorized Access to Google LERS
Chat Control: Between hunting down illegal channels and cracking down on freedom and privacy
An e-cigarette becomes a web server. And let hacking be!

ShinyHunters violates Gucci, Balenciaga, and Alexander McQueen: $7.4 million worth of records exposed
Redazione RHC - September 16th, 2025
Kering, the luxury and fashion giant, has officially announced that a data breach was perpetrated against customers of its leading brands, including Gucci, Balenciaga, and Alexander McQueen. ShinyHunters, the same...

RHC interviews ShinyHunters: “Systems can be repaired, but people remain vulnerable!”
RHC Dark Lab - September 16th, 2025
ShinyHunters is a group of threat actors that gained notoriety after the massive data breach against Salesforce, an incident that led Google to closely monitor them and assign them the...

Perl returns to the top 10 most popular programming languages
Redazione RHC - September 16th, 2025
TIOBE Software has released its September ranking of the most popular programming languages. The highlight of the publication was Perl's return to the top 10, jumping from 27th to 10th...

Hacker Scattered LAPSUS$ Hunters: Unauthorized Access to Google LERS
Redazione RHC - September 16th, 2025
Google executives said that hackers created a fake account on the Law Enforcement Request System (LERS), the company's platform used by law enforcement agencies to submit official data requests. Late...

Chat Control: Between hunting down illegal channels and cracking down on freedom and privacy
Sandro Sana - September 15th, 2025
The news is simple, the technology is not. Chat Control (CSAR) was created to uncover CSAM and grooming dynamics within messaging platforms. The "modernized" version forgoes the server-side backdoor and...

An e-cigarette becomes a web server. And let hacking be!
Redazione RHC - September 15th, 2025
Richard Stallman said many years ago "Playfully doing something difficult, whether it's useful or not, that's hacking!" Romanian engineer and origami master Bogdan Ionescu, known by the nickname BogdanTheGeek, has...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

