Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Banner Ancharia Mobile 1
970x120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Tor Boosts Security with Counter Galois Onion CGO Encryption
Di Redazione RHC - 27/11/2025

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

Immagine del sito
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Di Redazione RHC - 26/11/2025

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Immagine del sito
Investment Scam Alert: How to Avoid Losing Thousands
Di Redazione RHC - 26/11/2025

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

Immagine del sito
Malware Uses Finger Command to Infect Windows Devices
Di Redazione RHC - 26/11/2025

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

Immagine del sito
The AGI Revolution: How Mark Gubrud’s Term Changed Tech Forever
Di Redazione RHC - 25/11/2025

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...

Mustang Panda, New SnakeDisk Cyber Attack Targeting Thailand

IBM X-Force researchers have discovered new operations by the Chinese group Hive0154, better known as Mustang Panda. Experts have documented the simul...
Redazione RHC - 15/09/2025 - 11:08

Goodbye, Windows 10! Microsoft warns that updates will end on October 14th.

Microsoft reminded users that support for the beloved Windows 10 will end in a month. Starting October 14, 2025, the system will no longer receive sec...
Redazione RHC - 15/09/2025 - 09:03

BitLocker in the crosshairs: stealth attacks via COM hijacking. Online PoC

An innovative tool known as BitlockMove has been introduced, which highlights a novel lateral movement technique. This PoC leverages DCOM interfaces a...
Redazione RHC - 15/09/2025 - 08:31

From image theft to deepfakes: the new frontier of digital manipulation

In recent months, I've repeatedly found myself filing complaints about fake videos circulating online. We're not just talking about stolen content dis...
Paolo Galdieri - 15/09/2025 - 07:58

The ChillyHell backdoor returns to threaten macOS systems.

Researchers have reported a new surge in activity for ChillyHell, a modular backdoor for macOS that was thought to be dormant for years, but which app...
Redazione RHC - 15/09/2025 - 07:39

Regulating out-of-office work: a best practice for organizations and beyond.

When talking about information security, we must first take a breath and realize that we need to dive deeper than just computer systems and directly e...
Stefano Gazzella - 15/09/2025 - 07:31

Mustang Panda, New SnakeDisk Cyber Attack Targeting Thailand

- September 14th, 2025

IBM X-Force researchers have discovered new operations by the Chinese group Hive0154, better known as Mustang Panda. Experts have documented the simultaneous use of an advanced version of the Toneshell...

Facebook Linkedin X

Goodbye, Windows 10! Microsoft warns that updates will end on October 14th.

- September 14th, 2025

Microsoft reminded users that support for the beloved Windows 10 will end in a month. Starting October 14, 2025, the system will no longer receive security updates, bug fixes, and...

Facebook Linkedin X

BitLocker in the crosshairs: stealth attacks via COM hijacking. Online PoC

- September 14th, 2025

An innovative tool known as BitlockMove has been introduced, which highlights a novel lateral movement technique. This PoC leverages DCOM interfaces and COM hijacking, both of which are functional for...

Facebook Linkedin X

From image theft to deepfakes: the new frontier of digital manipulation

- September 14th, 2025

In recent months, I've repeatedly found myself filing complaints about fake videos circulating online. We're not just talking about stolen content distributed without consent, but also deepfakes: videos in which...

Facebook Linkedin X

The ChillyHell backdoor returns to threaten macOS systems.

- September 14th, 2025

Researchers have reported a new surge in activity for ChillyHell, a modular backdoor for macOS that was thought to be dormant for years, but which appears to have infected computers...

Facebook Linkedin X

Regulating out-of-office work: a best practice for organizations and beyond.

- September 14th, 2025

When talking about information security, we must first take a breath and realize that we need to dive deeper than just computer systems and directly expressed information. It concerns all...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE