Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...
At the Spinoza Campus in Amsterdam, 1,200 students were held hostage by washing machines.
China reports 600 APT cyber attacks in 2024. Washington is in its sights.
Looking for Volodymyr Tymoshchuk! 11 million dollars for the Nefilim hacker
Microsoft warns: Critical vulnerabilities in Office! Users and admins at risk
New AD DS Vulnerability (CVE-2025-21293) Could Hand Hackers the Keys to the Entire Corporate Network
Google fights misinformation: C2PA arrives on Pixel and Photos for AI image recognition.

At the Spinoza Campus in Amsterdam, 1,200 students were held hostage by washing machines.
Redazione RHC - September 11th, 2025
An unusual incident occurred at the Spinoza Campus in Amsterdam: an unknown attacker hacked the digital payment system of five washing machines. For several weeks, students were able to use...

China reports 600 APT cyber attacks in 2024. Washington is in its sights.
Redazione RHC - September 11th, 2025
During a regular press conference, Foreign Ministry spokesperson Guo Jiakun answered questions from reporters on various current international issues. At the center of the discussion were cyber attacks attributed to...

Looking for Volodymyr Tymoshchuk! 11 million dollars for the Nefilim hacker
Redazione RHC - September 11th, 2025
The U.S. Department of Justice has indicted Ukrainian Volodymyr Tymoshchuk on seven counts of computer hacking and extortion. He is considered one of the most dangerous hackers of recent years....

Microsoft warns: Critical vulnerabilities in Office! Users and admins at risk
Redazione RHC - September 11th, 2025
On September 9, 2025, two significant vulnerabilities were discovered in Microsoft Office, for which dedicated patches were created. These vulnerabilities, if exploited by attackers, could allow malicious code to be...

New AD DS Vulnerability (CVE-2025-21293) Could Hand Hackers the Keys to the Entire Corporate Network
Antonio Piazzolla - September 11th, 2025
Microsoft recently published a security advisory regarding a new vulnerability affecting Active Directory Domain Services (AD DS). The flaw, identified as CVE-2025-21293, is classified as an Elevation of Privilege vulnerability...

Google fights misinformation: C2PA arrives on Pixel and Photos for AI image recognition.
Redazione RHC - September 11th, 2025
Google announced that it will integrate C2PA Content Credentials technology into the Pixel 10 camera app and Google Photos to help users distinguish authentic images from those created or modified...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

