Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...
Windows: Security updates cause problems with UAC and app installation
Attackers are using Velociraptor for cyberattacks. Rapid7 is aware
Supercomputers: Italy ranks sixth and tenth in the 2025 TOP500 rankings.
Underwater warfare is upon us! Will Chinese cable cutters pose a global threat?
$16 billion in stolen Apple, Meta, and Google credentials up for sale for $121,000
The European Union General Court “upholds” the transfer of personal data to the United States. For now

Windows: Security updates cause problems with UAC and app installation
Redazione RHC - September 4th, 2025
Microsoft has announced that the August 2025 Windows security updates may cause unexpected User Account Control (UAC) prompts and issues when installing apps. The bug affects non-administrator users on all...

Attackers are using Velociraptor for cyberattacks. Rapid7 is aware
Redazione RHC - September 4th, 2025
Sophos security specialists have drawn attention to a cyberattack in which unknown attackers used the open-source forensic tool Velociraptor to monitor endpoints. "In this incident, attackers used a tool to...

Supercomputers: Italy ranks sixth and tenth in the 2025 TOP500 rankings.
Redazione RHC - September 4th, 2025
The world of supercomputers has entered the era of exascale computing. The June 2025 TOP500 ranking recorded three American systems at the top, a sensational debut from Europe, and a...

Underwater warfare is upon us! Will Chinese cable cutters pose a global threat?
Redazione RHC - September 4th, 2025
The new cable cutter, developed by the China Shipbuilding Research Center, is designed for use on advanced submarines such as the Fengdou and Haidou series. The device is capable of...

$16 billion in stolen Apple, Meta, and Google credentials up for sale for $121,000
Redazione RHC - September 4th, 2025
The Darklab team, Red Hot Cyber's community of threat intelligence experts, has identified an ad on the dark web marketplace "Tor Amazon", the criminal counterpart of the popular e-commerce site...

The European Union General Court “upholds” the transfer of personal data to the United States. For now
Stefano Gazzella - September 4th, 2025
April 1st wasn't an April Fool's joke: the first hearing in the Latombe v. Commission case was adjourned to September 3rd for a ruling on the appeal filed for the...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

