Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...
Jaguar Land Rover cyberattack leaves $50 million in losses
Microsoft accused by Ron Wyden of cybersecurity negligence
CrowdStrike and Meta launch CyberSOCEval to evaluate AI in cybersecurity
EvilAI: Malware that uses artificial intelligence to bypass security
There’s no antivirus to protect you! ModStealer affects Windows, macOS, and Linux.
From the Vatican to Facebook with fury: the miracle of a divine scam!

Jaguar Land Rover cyberattack leaves $50 million in losses
Redazione RHC - September 15th, 2025
The cyber attack on Jaguar Land Rover, which paralyzed the company's operations, has become one of the most serious crises for the British car manufacturer. The company was forced to...

Microsoft accused by Ron Wyden of cybersecurity negligence
Redazione RHC - September 15th, 2025
US Senator Ron Wyden sent a letter on September 10 to the Federal Trade Commission (FTC) requesting an investigation into Microsoft, accusing the company of "gross negligence" in the field...

CrowdStrike and Meta launch CyberSOCEval to evaluate AI in cybersecurity
Redazione RHC - September 14th, 2025
CrowdStrike today introduced, in collaboration with Meta, a new benchmark suite - CyberSOCEval - to evaluate the performance of artificial intelligence systems. in real security operations. Based on Meta's CyberSecEval...

EvilAI: Malware that uses artificial intelligence to bypass security
Redazione RHC - September 14th, 2025
A new EvilAI malware campaign tracked by Trend Micro has demonstrated how artificial intelligence is increasingly becoming a tool for cybercriminals. In recent weeks, dozens of infections have been reported...

There’s no antivirus to protect you! ModStealer affects Windows, macOS, and Linux.
Redazione RHC - September 14th, 2025
Mosyle has discovered a new malware program called ModStealer. The program is completely undetectable by antivirus solutions and was first uploaded to VirusTotal almost a month ago without any security...

From the Vatican to Facebook with fury: the miracle of a divine scam!
Redazione RHC - September 14th, 2025
In recent years, online scams have taken on increasingly sophisticated forms, exploiting not only social engineering techniques but also the trust that millions of people place in religious, institutional, or...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

