Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Crowdstrike 320×100
Banner Desktop

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Tor Boosts Security with Counter Galois Onion CGO Encryption
Di Redazione RHC - 27/11/2025

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

Immagine del sito
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Di Redazione RHC - 26/11/2025

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Immagine del sito
Investment Scam Alert: How to Avoid Losing Thousands
Di Redazione RHC - 26/11/2025

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

Immagine del sito
Malware Uses Finger Command to Infect Windows Devices
Di Redazione RHC - 26/11/2025

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

Immagine del sito
The AGI Revolution: How Mark Gubrud’s Term Changed Tech Forever
Di Redazione RHC - 25/11/2025

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...

Jaguar Land Rover cyberattack leaves $50 million in losses

The cyber attack on Jaguar Land Rover, which paralyzed the company's operations, has become one of the most serious crises for the British car manufac...
Redazione RHC - 16/09/2025 - 07:08

Microsoft accused by Ron Wyden of cybersecurity negligence

US Senator Ron Wyden sent a letter on September 10 to the Federal Trade Commission (FTC) requesting an investigation into Microsoft, accusing the comp...
Redazione RHC - 16/09/2025 - 07:04

CrowdStrike and Meta launch CyberSOCEval to evaluate AI in cybersecurity

CrowdStrike today introduced, in collaboration with Meta, a new benchmark suite - CyberSOCEval - to evaluate the performance of artificial intelligenc...
Redazione RHC - 15/09/2025 - 19:52

EvilAI: Malware that uses artificial intelligence to bypass security

A new EvilAI malware campaign tracked by Trend Micro has demonstrated how artificial intelligence is increasingly becoming a tool for cybercriminals. ...
Redazione RHC - 15/09/2025 - 19:44

There’s no antivirus to protect you! ModStealer affects Windows, macOS, and Linux.

Mosyle has discovered a new malware program called ModStealer. The program is completely undetectable by antivirus solutions and was first uploaded to...
Redazione RHC - 15/09/2025 - 16:00

From the Vatican to Facebook with fury: the miracle of a divine scam!

In recent years, online scams have taken on increasingly sophisticated forms, exploiting not only social engineering techniques but also the trust tha...
Redazione RHC - 15/09/2025 - 12:18

Jaguar Land Rover cyberattack leaves $50 million in losses

- September 15th, 2025

The cyber attack on Jaguar Land Rover, which paralyzed the company's operations, has become one of the most serious crises for the British car manufacturer. The company was forced to...

Facebook Linkedin X

Microsoft accused by Ron Wyden of cybersecurity negligence

- September 15th, 2025

US Senator Ron Wyden sent a letter on September 10 to the Federal Trade Commission (FTC) requesting an investigation into Microsoft, accusing the company of "gross negligence" in the field...

Facebook Linkedin X

CrowdStrike and Meta launch CyberSOCEval to evaluate AI in cybersecurity

- September 14th, 2025

CrowdStrike today introduced, in collaboration with Meta, a new benchmark suite - CyberSOCEval - to evaluate the performance of artificial intelligence systems. in real security operations. Based on Meta's CyberSecEval...

Facebook Linkedin X

EvilAI: Malware that uses artificial intelligence to bypass security

- September 14th, 2025

A new EvilAI malware campaign tracked by Trend Micro has demonstrated how artificial intelligence is increasingly becoming a tool for cybercriminals. In recent weeks, dozens of infections have been reported...

Facebook Linkedin X

There’s no antivirus to protect you! ModStealer affects Windows, macOS, and Linux.

- September 14th, 2025

Mosyle has discovered a new malware program called ModStealer. The program is completely undetectable by antivirus solutions and was first uploaded to VirusTotal almost a month ago without any security...

Facebook Linkedin X

From the Vatican to Facebook with fury: the miracle of a divine scam!

- September 14th, 2025

In recent years, online scams have taken on increasingly sophisticated forms, exploiting not only social engineering techniques but also the trust that millions of people place in religious, institutional, or...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE