Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Crowdstrike 320×100
970x20 Itcentric

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Tor Boosts Security with Counter Galois Onion CGO Encryption
Di Redazione RHC - 27/11/2025

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

Immagine del sito
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Di Redazione RHC - 26/11/2025

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Immagine del sito
Investment Scam Alert: How to Avoid Losing Thousands
Di Redazione RHC - 26/11/2025

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

Immagine del sito
Malware Uses Finger Command to Infect Windows Devices
Di Redazione RHC - 26/11/2025

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

Immagine del sito
The AGI Revolution: How Mark Gubrud’s Term Changed Tech Forever
Di Redazione RHC - 25/11/2025

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...

Critical Linux Vulnerability: 0-Click N-Days Exploit Allows Remote Code Execution

A security researcher recently developed a zero-click exploit for the Linux SMB3 kernel daemon (ksmbd), exploiting two specific vulnerabilities. This ...
Redazione RHC - 16/09/2025 - 11:37

Security alert for AI servers: thousands are at risk

Artificial intelligence systems are increasingly under attack. This data emerges from "Trend Micro State of AI Security Report, 1H 2025". The company ...
Redazione RHC - 16/09/2025 - 11:24

DeliveryRAT Trojan Alert: Hackers Steal Data and Money with Fake Apps

F6 and RuStore experts report having discovered and blocked 604 domains that were part of the infrastructure of hackers who infected mobile devices wi...
Redazione RHC - 16/09/2025 - 10:36

Plato, the cave, and social media: are we only looking at shadows?

The famous Socratic precept "Know thyself" has never been more relevant. Today, our digital identity is a fragmented mosaic of social profiles, search...
Daniela Farina - 16/09/2025 - 08:51

Vibe coding, yes, but be careful. Speed doesn’t always beat quality.

There's a new phenomenon in the programming industry: vibe coding. Developers are increasingly using artificial intelligence agents to speed up their ...
Redazione RHC - 16/09/2025 - 07:38

The Great Firewall in the Spotlight: The Leak Revealing the Industrialization of Chinese Censorship

Edited by Luca Stivali and Olivia Terragni. On September 11, 2025, what can be defined as the largest leak ever suffered by the Great Firewall of C...
Redazione RHC - 16/09/2025 - 07:21

Critical Linux Vulnerability: 0-Click N-Days Exploit Allows Remote Code Execution

- September 15th, 2025

A security researcher recently developed a zero-click exploit for the Linux SMB3 kernel daemon (ksmbd), exploiting two specific vulnerabilities. This exploit allows remote code execution (RCE) in kernel mode without...

Facebook Linkedin X

Security alert for AI servers: thousands are at risk

- September 15th, 2025

Artificial intelligence systems are increasingly under attack. This data emerges from "Trend Micro State of AI Security Report, 1H 2025". The company urges IT professionals and community leaders to follow...

Facebook Linkedin X

DeliveryRAT Trojan Alert: Hackers Steal Data and Money with Fake Apps

- September 15th, 2025

F6 and RuStore experts report having discovered and blocked 604 domains that were part of the infrastructure of hackers who infected mobile devices with the DeliveryRAT Trojan. The malware masqueraded...

Facebook Linkedin X

Plato, the cave, and social media: are we only looking at shadows?

- September 15th, 2025

The famous Socratic precept "Know thyself" has never been more relevant. Today, our digital identity is a fragmented mosaic of social profiles, search histories, and online interactions, constantly exposed and...

Facebook Linkedin X

Vibe coding, yes, but be careful. Speed doesn’t always beat quality.

- September 15th, 2025

There's a new phenomenon in the programming industry: vibe coding. Developers are increasingly using artificial intelligence agents to speed up their work, but they're also encountering unpredictable problems. The stories...

Facebook Linkedin X

The Great Firewall in the Spotlight: The Leak Revealing the Industrialization of Chinese Censorship

- September 15th, 2025

Edited by Luca Stivali and Olivia Terragni. On September 11, 2025, what can be defined as the largest leak ever suffered by the Great Firewall of China (GFW) exploded in...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE