Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...
Critical Linux Vulnerability: 0-Click N-Days Exploit Allows Remote Code Execution
Security alert for AI servers: thousands are at risk
DeliveryRAT Trojan Alert: Hackers Steal Data and Money with Fake Apps
Plato, the cave, and social media: are we only looking at shadows?
Vibe coding, yes, but be careful. Speed doesn’t always beat quality.
The Great Firewall in the Spotlight: The Leak Revealing the Industrialization of Chinese Censorship

Critical Linux Vulnerability: 0-Click N-Days Exploit Allows Remote Code Execution
Redazione RHC - September 15th, 2025
A security researcher recently developed a zero-click exploit for the Linux SMB3 kernel daemon (ksmbd), exploiting two specific vulnerabilities. This exploit allows remote code execution (RCE) in kernel mode without...

Security alert for AI servers: thousands are at risk
Redazione RHC - September 15th, 2025
Artificial intelligence systems are increasingly under attack. This data emerges from "Trend Micro State of AI Security Report, 1H 2025". The company urges IT professionals and community leaders to follow...

DeliveryRAT Trojan Alert: Hackers Steal Data and Money with Fake Apps
Redazione RHC - September 15th, 2025
F6 and RuStore experts report having discovered and blocked 604 domains that were part of the infrastructure of hackers who infected mobile devices with the DeliveryRAT Trojan. The malware masqueraded...

Plato, the cave, and social media: are we only looking at shadows?
Daniela Farina - September 15th, 2025
The famous Socratic precept "Know thyself" has never been more relevant. Today, our digital identity is a fragmented mosaic of social profiles, search histories, and online interactions, constantly exposed and...

Vibe coding, yes, but be careful. Speed doesn’t always beat quality.
Redazione RHC - September 15th, 2025
There's a new phenomenon in the programming industry: vibe coding. Developers are increasingly using artificial intelligence agents to speed up their work, but they're also encountering unpredictable problems. The stories...

The Great Firewall in the Spotlight: The Leak Revealing the Industrialization of Chinese Censorship
Redazione RHC - September 15th, 2025
Edited by Luca Stivali and Olivia Terragni. On September 11, 2025, what can be defined as the largest leak ever suffered by the Great Firewall of China (GFW) exploded in...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

