Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
320×100
Fortinet 970x120px

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Tor Boosts Security with Counter Galois Onion CGO Encryption
Di Redazione RHC - 27/11/2025

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

Immagine del sito
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Di Redazione RHC - 26/11/2025

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Immagine del sito
Investment Scam Alert: How to Avoid Losing Thousands
Di Redazione RHC - 26/11/2025

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

Immagine del sito
Malware Uses Finger Command to Infect Windows Devices
Di Redazione RHC - 26/11/2025

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

Immagine del sito
The AGI Revolution: How Mark Gubrud’s Term Changed Tech Forever
Di Redazione RHC - 25/11/2025

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...

Tasting the Exploit: HackerHood testa l’exploit di WINRAR CVE-2025-8088

Manuel Roccon, leader of Red Hot Cyber's HackerHood ethics team, has created a detailed video demonstration on YouTube that demonstrates in a practica...
Redazione RHC - 09/09/2025 - 08:05

Hackers bypass the most stringent WAFs with a single line of JavaScript! The moral? Always write securely.

In a security test, Ethiack researchers found a way to bypass even the most stringent web application firewalls using an unusual technique: JavaScript...
Redazione RHC - 09/09/2025 - 07:54

Thermoptic: The Tool for Bypassing Fingerprint-Based Lock Systems

Security researcher Matthew Bryant recently unveiled Thermoptic, an innovative tool that acts as an HTTP proxy. This tool can disguise network req...
Redazione RHC - 09/09/2025 - 07:40

NightshadeC2, the new botnet that uses unconventional methods to bypass protection

eSentire has reported the discovery of a new botnet called NightshadeC2, which uses unconventional methods to bypass protection and sandboxes. The mal...
Redazione RHC - 09/09/2025 - 07:35

Cephalus is coming! The ransomware group that attacks via DLL replacement.

In mid-August, researchers encountered the Cephalus ransomware in two separate incidents. Among recent outbreaks of families like Crux and KawaLocker,...
Redazione RHC - 08/09/2025 - 19:15

WhatsApp and Apple in emergency: DNG bug allows remote control without clicking

On August 20, Apple released an unscheduled security update for all major operating systems: iOS, iPadOS, macOS, and other platforms. The patch addres...
Redazione RHC - 08/09/2025 - 17:21

Tasting the Exploit: HackerHood testa l’exploit di WINRAR CVE-2025-8088

- September 8th, 2025

Manuel Roccon, leader of Red Hot Cyber's HackerHood ethics team, has created a detailed video demonstration on YouTube that demonstrates in a practical way how the exploit based on the...

Facebook Linkedin X

Hackers bypass the most stringent WAFs with a single line of JavaScript! The moral? Always write securely.

- September 8th, 2025

In a security test, Ethiack researchers found a way to bypass even the most stringent web application firewalls using an unusual technique: JavaScript injection via HTTP parameter pollution. The test...

Facebook Linkedin X

Thermoptic: The Tool for Bypassing Fingerprint-Based Lock Systems

- September 8th, 2025

Security researcher Matthew Bryant recently unveiled Thermoptic, an innovative tool that acts as an HTTP proxy. This tool can disguise network requests to appear to be traffic from the Chrome...

Facebook Linkedin X

NightshadeC2, the new botnet that uses unconventional methods to bypass protection

- September 8th, 2025

eSentire has reported the discovery of a new botnet called NightshadeC2, which uses unconventional methods to bypass protection and sandboxes. The malware is distributed via counterfeit versions of legitimate programs...

Facebook Linkedin X

Cephalus is coming! The ransomware group that attacks via DLL replacement.

- September 7th, 2025

In mid-August, researchers encountered the Cephalus ransomware in two separate incidents. Among recent outbreaks of families like Crux and KawaLocker, a ransom note beginning with the words "We are Cephalus"...

Facebook Linkedin X

WhatsApp and Apple in emergency: DNG bug allows remote control without clicking

- September 7th, 2025

On August 20, Apple released an unscheduled security update for all major operating systems: iOS, iPadOS, macOS, and other platforms. The patch addresses the CVE-2025-43300 vulnerability in the ImageIO module:...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE