Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Redhotcyber Banner Sito 320x100px Uscita 101125
Fortinet 970x120px

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Tor Boosts Security with Counter Galois Onion CGO Encryption
Di Redazione RHC - 27/11/2025

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

Immagine del sito
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Di Redazione RHC - 26/11/2025

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Immagine del sito
Investment Scam Alert: How to Avoid Losing Thousands
Di Redazione RHC - 26/11/2025

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

Immagine del sito
Malware Uses Finger Command to Infect Windows Devices
Di Redazione RHC - 26/11/2025

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

Immagine del sito
The AGI Revolution: How Mark Gubrud’s Term Changed Tech Forever
Di Redazione RHC - 25/11/2025

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...

9.9 out of 10! All SAP S/4HANA systems at risk: Patch now!

A critical vulnerability, CVE-2025-42957, has been identified in SAP S/4HANA, which has received a CVSS score of 9.9. The flaw allows a minimally priv...
Redazione RHC - 08/09/2025 - 09:49

Xi Jinping and the Chinese APT’s Ambition

The post-COVID macro political movements, including ongoing conflicts, have prompted a majority of states to shift their medium- to long-term politica...
Alessio Stefan - 08/09/2025 - 08:19

AI needs a shrink! It can be fooled like humans.

Entrepreneur Dan Shapiro ran into an unexpected problem: a popular AI-powered chatbot refused to decrypt company documents, citing copyright infringem...
Redazione RHC - 08/09/2025 - 08:18

Telegram as a Command & Control Platform for Criminal Activities and the Role of Threat Intelligence

In today's cybersecurity landscape, one of the most worrying trends is the abuse of legitimate messaging platforms for malicious purposes. Telegram in...
Redazione RHC - 08/09/2025 - 08:15

Houthi threat or mysterious incident? The Red Sea paralyzes Asia and the Middle East.

As we reported this morning, several undersea cables in the Red Sea have been severed, causing internet access delays and service disruptions in Asia ...
Redazione RHC - 07/09/2025 - 22:14

Fired by the AI She Helped Create: The Shocking Story of Katherine Sullivan

In Australia, a 65-year-old bank employee was fired after the introduction of artificial intelligence, despite having contributed to its development. ...
Redazione RHC - 07/09/2025 - 11:52

9.9 out of 10! All SAP S/4HANA systems at risk: Patch now!

- September 7th, 2025

A critical vulnerability, CVE-2025-42957, has been identified in SAP S/4HANA, which has received a CVSS score of 9.9. The flaw allows a minimally privileged user to perform code injection and...

Facebook Linkedin X

Xi Jinping and the Chinese APT’s Ambition

- September 7th, 2025

The post-COVID macro political movements, including ongoing conflicts, have prompted a majority of states to shift their medium- to long-term political objectives. Clearly, a paradigm shift has been very common...

Facebook Linkedin X

AI needs a shrink! It can be fooled like humans.

- September 7th, 2025

Entrepreneur Dan Shapiro ran into an unexpected problem: a popular AI-powered chatbot refused to decrypt company documents, citing copyright infringement. But instead of giving up, Shapiro decided to try an...

Facebook Linkedin X

Telegram as a Command & Control Platform for Criminal Activities and the Role of Threat Intelligence

- September 7th, 2025

In today's cybersecurity landscape, one of the most worrying trends is the abuse of legitimate messaging platforms for malicious purposes. Telegram in particular is increasingly being exploited by criminal groups...

Facebook Linkedin X

Houthi threat or mysterious incident? The Red Sea paralyzes Asia and the Middle East.

- September 6th, 2025

As we reported this morning, several undersea cables in the Red Sea have been severed, causing internet access delays and service disruptions in Asia and the Middle East. Microsoft said...

Facebook Linkedin X

Fired by the AI She Helped Create: The Shocking Story of Katherine Sullivan

- September 6th, 2025

In Australia, a 65-year-old bank employee was fired after the introduction of artificial intelligence, despite having contributed to its development. The story was reported by The Sun and concerns Katherine...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE