Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
LECS 320x100 1
2nd Edition GlitchZone RHC 970x120 2

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Tor Boosts Security with Counter Galois Onion CGO Encryption
Di Redazione RHC - 27/11/2025

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

Immagine del sito
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Di Redazione RHC - 26/11/2025

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Immagine del sito
Investment Scam Alert: How to Avoid Losing Thousands
Di Redazione RHC - 26/11/2025

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

Immagine del sito
Malware Uses Finger Command to Infect Windows Devices
Di Redazione RHC - 26/11/2025

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

Immagine del sito
The AGI Revolution: How Mark Gubrud’s Term Changed Tech Forever
Di Redazione RHC - 25/11/2025

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...

FlexiSPY Alert: The Easy-to-Use Spy App Can Intercept Everything, Even El Chapo

Two Kenyan documentary filmmakers were placed under surveillance by security services for their work on a film about youth protests. Computer forensic...
Redazione RHC - 12/09/2025 - 07:51

SpamGPT is here! The new phishing kit that combines AI, spam, and diabolical genius.

A new tool called SpamGPT has appeared on underground forums and has quickly become a hot topic in the cybersecurity community. The malicious software...
Redazione RHC - 11/09/2025 - 19:10

Critical authentication bypass bug affects Sophos AP6

Sophos has announced that it has fixed a critical authentication bypass vulnerability affecting its AP6 series wireless access points. The flaw allowe...
Redazione RHC - 11/09/2025 - 14:32

An RCE in Apple CarPlay allows root access to vehicle infotainment systems

At the DefCon security conference, researchers presented a significant exploit chain that allows attackers to gain administrator permissions for vehic...
Redazione RHC - 11/09/2025 - 14:18

Volkswagen is investing in artificial intelligence: one billion euros to reduce costs

Volkswagen announced on the first day of the IAA Mobility international trade fair in Munich its intention to integrate artificial intelligence into a...
Redazione RHC - 11/09/2025 - 13:59

A bug in Google Drive allows access to other people’s files on shared desktops.

Millions of people and businesses rely on Google Drive to store contracts, reports, photos, and work documents, using the Windows desktop client to sy...
Redazione RHC - 11/09/2025 - 11:58

FlexiSPY Alert: The Easy-to-Use Spy App Can Intercept Everything, Even El Chapo

- September 11th, 2025

Two Kenyan documentary filmmakers were placed under surveillance by security services for their work on a film about youth protests. Computer forensics researchers say their phones were infected with FlexiSPY...

Facebook Linkedin X

SpamGPT is here! The new phishing kit that combines AI, spam, and diabolical genius.

- September 10th, 2025

A new tool called SpamGPT has appeared on underground forums and has quickly become a hot topic in the cybersecurity community. The malicious software combines the capabilities of generative artificial...

Facebook Linkedin X

Critical authentication bypass bug affects Sophos AP6

- September 10th, 2025

Sophos has announced that it has fixed a critical authentication bypass vulnerability affecting its AP6 series wireless access points. The flaw allowed a remote attacker to gain administrative privileges by...

Facebook Linkedin X

An RCE in Apple CarPlay allows root access to vehicle infotainment systems

- September 10th, 2025

At the DefCon security conference, researchers presented a significant exploit chain that allows attackers to gain administrator permissions for vehicle entertainment systems through Apple CarPlay. The attack known as "Pwn...

Facebook Linkedin X

Volkswagen is investing in artificial intelligence: one billion euros to reduce costs

- September 10th, 2025

Volkswagen announced on the first day of the IAA Mobility international trade fair in Munich its intention to integrate artificial intelligence into all areas of its business, with the aim...

Facebook Linkedin X

A bug in Google Drive allows access to other people’s files on shared desktops.

- September 10th, 2025

Millions of people and businesses rely on Google Drive to store contracts, reports, photos, and work documents, using the Windows desktop client to sync files between local and cloud folders....

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE