Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...
9.9 out of 10! All SAP S/4HANA systems at risk: Patch now!
Xi Jinping and the Chinese APT’s Ambition
AI needs a shrink! It can be fooled like humans.
Telegram as a Command & Control Platform for Criminal Activities and the Role of Threat Intelligence
Houthi threat or mysterious incident? The Red Sea paralyzes Asia and the Middle East.
Fired by the AI She Helped Create: The Shocking Story of Katherine Sullivan

9.9 out of 10! All SAP S/4HANA systems at risk: Patch now!
Redazione RHC - September 7th, 2025
A critical vulnerability, CVE-2025-42957, has been identified in SAP S/4HANA, which has received a CVSS score of 9.9. The flaw allows a minimally privileged user to perform code injection and...

Xi Jinping and the Chinese APT’s Ambition
Alessio Stefan - September 7th, 2025
The post-COVID macro political movements, including ongoing conflicts, have prompted a majority of states to shift their medium- to long-term political objectives. Clearly, a paradigm shift has been very common...

AI needs a shrink! It can be fooled like humans.
Redazione RHC - September 7th, 2025
Entrepreneur Dan Shapiro ran into an unexpected problem: a popular AI-powered chatbot refused to decrypt company documents, citing copyright infringement. But instead of giving up, Shapiro decided to try an...

Telegram as a Command & Control Platform for Criminal Activities and the Role of Threat Intelligence
Redazione RHC - September 7th, 2025
In today's cybersecurity landscape, one of the most worrying trends is the abuse of legitimate messaging platforms for malicious purposes. Telegram in particular is increasingly being exploited by criminal groups...

Houthi threat or mysterious incident? The Red Sea paralyzes Asia and the Middle East.
Redazione RHC - September 6th, 2025
As we reported this morning, several undersea cables in the Red Sea have been severed, causing internet access delays and service disruptions in Asia and the Middle East. Microsoft said...

Fired by the AI She Helped Create: The Shocking Story of Katherine Sullivan
Redazione RHC - September 6th, 2025
In Australia, a 65-year-old bank employee was fired after the introduction of artificial intelligence, despite having contributed to its development. The story was reported by The Sun and concerns Katherine...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

