Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...
Jupiter, the exascale supercomputer that aims to revolutionize AI in Europe
38 million Italian phone numbers for sale on the dark web. It’s smishing!
Apitor, the first robot that helps children do their homework and the whistleblower for China
Hackable restaurant robots could serve sushi… at the attacker’s home.
LECS powered by Cyber Evolution: la prima black box NDR completamente Made in Italy
AI A2 detected 102 0-day bugs and created exploits in Android apps for $1.77

Jupiter, the exascale supercomputer that aims to revolutionize AI in Europe
Redazione RHC - September 5th, 2025
The Jupiter supercomputer, inaugurated at the Jülich Supercomputing Center in Germany, represents a milestone for Europe. It is the continent's first exascale supercomputer, capable of performing at least one quadrillion...

38 million Italian phone numbers for sale on the dark web. It’s smishing!
Redazione RHC - September 5th, 2025
Seven out of ten Italians have their phone numbers included in this database. But what does it mean to have such a large number of phone numbers concentrated within a...

Apitor, the first robot that helps children do their homework and the whistleblower for China
Redazione RHC - September 5th, 2025
The U.S. Department of Justice has filed a lawsuit against Apitor Technology, accusing it of secretly collecting children's location data through a Chinese partner without their parents' knowledge or consent....

Hackable restaurant robots could serve sushi… at the attacker’s home.
Redazione RHC - September 5th, 2025
An independent security specialist, known by the nickname BobDaHacker, discovered security flaws in Pudu Robotics (the world's leading provider of commercial service robots). The vulnerabilities allowed attackers to redirect the...

LECS powered by Cyber Evolution: la prima black box NDR completamente Made in Italy
Redazione RHC - September 5th, 2025
In the current cybersecurity landscape, threats are moving ever faster and more sophisticated. Traditional defense tools are no longer sufficient to ensure complete visibility, especially when the attack leaves no...

AI A2 detected 102 0-day bugs and created exploits in Android apps for $1.77
Redazione RHC - September 5th, 2025
Artificial intelligence systems have been criticized for creating confusing vulnerability reports and inundating open-source developers with irrelevant complaints. But researchers at Nanjing University and the University of Sydney have an...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

