Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...
Mustang Panda, New SnakeDisk Cyber Attack Targeting Thailand
Goodbye, Windows 10! Microsoft warns that updates will end on October 14th.
BitLocker in the crosshairs: stealth attacks via COM hijacking. Online PoC
From image theft to deepfakes: the new frontier of digital manipulation
The ChillyHell backdoor returns to threaten macOS systems.
Regulating out-of-office work: a best practice for organizations and beyond.

Mustang Panda, New SnakeDisk Cyber Attack Targeting Thailand
Redazione RHC - September 14th, 2025
IBM X-Force researchers have discovered new operations by the Chinese group Hive0154, better known as Mustang Panda. Experts have documented the simultaneous use of an advanced version of the Toneshell...

Goodbye, Windows 10! Microsoft warns that updates will end on October 14th.
Redazione RHC - September 14th, 2025
Microsoft reminded users that support for the beloved Windows 10 will end in a month. Starting October 14, 2025, the system will no longer receive security updates, bug fixes, and...

BitLocker in the crosshairs: stealth attacks via COM hijacking. Online PoC
Redazione RHC - September 14th, 2025
An innovative tool known as BitlockMove has been introduced, which highlights a novel lateral movement technique. This PoC leverages DCOM interfaces and COM hijacking, both of which are functional for...

From image theft to deepfakes: the new frontier of digital manipulation
Paolo Galdieri - September 14th, 2025
In recent months, I've repeatedly found myself filing complaints about fake videos circulating online. We're not just talking about stolen content distributed without consent, but also deepfakes: videos in which...

The ChillyHell backdoor returns to threaten macOS systems.
Redazione RHC - September 14th, 2025
Researchers have reported a new surge in activity for ChillyHell, a modular backdoor for macOS that was thought to be dormant for years, but which appears to have infected computers...

Regulating out-of-office work: a best practice for organizations and beyond.
Stefano Gazzella - September 14th, 2025
When talking about information security, we must first take a breath and realize that we need to dive deeper than just computer systems and directly expressed information. It concerns all...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

