Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...
FlexiSPY Alert: The Easy-to-Use Spy App Can Intercept Everything, Even El Chapo
SpamGPT is here! The new phishing kit that combines AI, spam, and diabolical genius.
Critical authentication bypass bug affects Sophos AP6
An RCE in Apple CarPlay allows root access to vehicle infotainment systems
Volkswagen is investing in artificial intelligence: one billion euros to reduce costs
A bug in Google Drive allows access to other people’s files on shared desktops.

FlexiSPY Alert: The Easy-to-Use Spy App Can Intercept Everything, Even El Chapo
Redazione RHC - September 11th, 2025
Two Kenyan documentary filmmakers were placed under surveillance by security services for their work on a film about youth protests. Computer forensics researchers say their phones were infected with FlexiSPY...

SpamGPT is here! The new phishing kit that combines AI, spam, and diabolical genius.
Redazione RHC - September 10th, 2025
A new tool called SpamGPT has appeared on underground forums and has quickly become a hot topic in the cybersecurity community. The malicious software combines the capabilities of generative artificial...

Critical authentication bypass bug affects Sophos AP6
Redazione RHC - September 10th, 2025
Sophos has announced that it has fixed a critical authentication bypass vulnerability affecting its AP6 series wireless access points. The flaw allowed a remote attacker to gain administrative privileges by...

An RCE in Apple CarPlay allows root access to vehicle infotainment systems
Redazione RHC - September 10th, 2025
At the DefCon security conference, researchers presented a significant exploit chain that allows attackers to gain administrator permissions for vehicle entertainment systems through Apple CarPlay. The attack known as "Pwn...

Volkswagen is investing in artificial intelligence: one billion euros to reduce costs
Redazione RHC - September 10th, 2025
Volkswagen announced on the first day of the IAA Mobility international trade fair in Munich its intention to integrate artificial intelligence into all areas of its business, with the aim...

A bug in Google Drive allows access to other people’s files on shared desktops.
Redazione RHC - September 10th, 2025
Millions of people and businesses rely on Google Drive to store contracts, reports, photos, and work documents, using the Windows desktop client to sync files between local and cloud folders....
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

