Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
TM RedHotCyber 320x100 042514
Banner Ancharia Desktop 1 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Tor Boosts Security with Counter Galois Onion CGO Encryption
Di Redazione RHC - 27/11/2025

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

Immagine del sito
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Di Redazione RHC - 26/11/2025

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Immagine del sito
Investment Scam Alert: How to Avoid Losing Thousands
Di Redazione RHC - 26/11/2025

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

Immagine del sito
Malware Uses Finger Command to Infect Windows Devices
Di Redazione RHC - 26/11/2025

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

Immagine del sito
The AGI Revolution: How Mark Gubrud’s Term Changed Tech Forever
Di Redazione RHC - 25/11/2025

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...

Stealerium and Phantom: How Open-Source Infostealers Are Taking the World by storm

Researchers at Proofpoint, a leader in cybersecurity and information protection, have detected a worrying increase in the use of open-source malware, ...
Redazione RHC - 08/09/2025 - 14:29

The largest pirate sports streaming network has been shut down.

Egyptian authorities and the Alliance for Creativity and Entertainment (ACE) say they have shut down Streameast, the largest illegal sports streaming ...
Redazione RHC - 08/09/2025 - 14:16

Criticism of XChat: The new encrypted messaging service is no good

The social network X, formerly known as Twitter, has begun rolling out a new encrypted messaging service called XChat. It formally presents itself as ...
Redazione RHC - 08/09/2025 - 13:28

CrowdStrike Threat Hunting Report 2025: Cybercriminals Use AI for Large-Scale Attacks

Over 320 companies have been breached by groups linked to North Korea (DPRK) with generative AI-powered attacks. Threat actors are leveraging AI agent...
Redazione RHC - 08/09/2025 - 11:54

Apple launches Security Research Device 2026 program for security researchers

Apple has announced that it will accept applications for the Security Research Device Program (SRDP) 2026. Bug hunters interested in receiving an iPho...
Redazione RHC - 08/09/2025 - 11:01

Salesloft Drift Incident Expands: Tenable Confirms Customer Data Breach

Tenable also suffered a compromise of contact information and support case details for some customers. The company said the incident was related to a...
Redazione RHC - 08/09/2025 - 10:04

Stealerium and Phantom: How Open-Source Infostealers Are Taking the World by storm

- September 7th, 2025

Researchers at Proofpoint, a leader in cybersecurity and information protection, have detected a worrying increase in the use of open-source malware, such as Stealerium and Phantom Stealer, by opportunistic cybercriminals....

Facebook Linkedin X

The largest pirate sports streaming network has been shut down.

- September 7th, 2025

Egyptian authorities and the Alliance for Creativity and Entertainment (ACE) say they have shut down Streameast, the largest illegal sports streaming network in the world, and arrested two of the...

Facebook Linkedin X

Criticism of XChat: The new encrypted messaging service is no good

- September 7th, 2025

The social network X, formerly known as Twitter, has begun rolling out a new encrypted messaging service called XChat. It formally presents itself as a completely end-to-end encrypted platform: correspondence...

Facebook Linkedin X

CrowdStrike Threat Hunting Report 2025: Cybercriminals Use AI for Large-Scale Attacks

- September 7th, 2025

Over 320 companies have been breached by groups linked to North Korea (DPRK) with generative AI-powered attacks. Threat actors are leveraging AI agents, making autonomous systems the new attack perimeter...

Facebook Linkedin X

Apple launches Security Research Device 2026 program for security researchers

- September 7th, 2025

Apple has announced that it will accept applications for the Security Research Device Program (SRDP) 2026. Bug hunters interested in receiving an iPhone configured specifically for security research have until...

Facebook Linkedin X

Salesloft Drift Incident Expands: Tenable Confirms Customer Data Breach

- September 7th, 2025

Tenable also suffered a compromise of contact information and support case details for some customers. The company said the incident was related to a large-scale data theft operation, which aimed...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE