Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
2nd Edition GlitchZone RHC 320x100 2
Fortinet 970x120px

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Tor Boosts Security with Counter Galois Onion CGO Encryption
Di Redazione RHC - 27/11/2025

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

Immagine del sito
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Di Redazione RHC - 26/11/2025

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Immagine del sito
Investment Scam Alert: How to Avoid Losing Thousands
Di Redazione RHC - 26/11/2025

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

Immagine del sito
Malware Uses Finger Command to Infect Windows Devices
Di Redazione RHC - 26/11/2025

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

Immagine del sito
The AGI Revolution: How Mark Gubrud’s Term Changed Tech Forever
Di Redazione RHC - 25/11/2025

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...

Windows: Security updates cause problems with UAC and app installation

Microsoft has announced that the August 2025 Windows security updates may cause unexpected User Account Control (UAC) prompts and issues when installi...
Redazione RHC - 05/09/2025 - 12:38

Attackers are using Velociraptor for cyberattacks. Rapid7 is aware

Sophos security specialists have drawn attention to a cyberattack in which unknown attackers used the open-source forensic tool Velociraptor to monito...
Redazione RHC - 05/09/2025 - 12:30

Supercomputers: Italy ranks sixth and tenth in the 2025 TOP500 rankings.

The world of supercomputers has entered the era of exascale computing. The June 2025 TOP500 ranking recorded three American systems at the top, a sens...
Redazione RHC - 05/09/2025 - 09:24

Underwater warfare is upon us! Will Chinese cable cutters pose a global threat?

The new cable cutter, developed by the China Shipbuilding Research Center, is designed for use on advanced submarines such as the Fengdou and Haidou s...
Redazione RHC - 05/09/2025 - 09:02

$16 billion in stolen Apple, Meta, and Google credentials up for sale for $121,000

The Darklab team, Red Hot Cyber's community of threat intelligence experts, has identified an ad on the dark web marketplace "Tor Amazon", the crimina...
Redazione RHC - 05/09/2025 - 08:21

The European Union General Court “upholds” the transfer of personal data to the United States. For now

April 1st wasn't an April Fool's joke: the first hearing in the Latombe v. Commission case was adjourned to September 3rd for a ruling on the appeal f...
Stefano Gazzella - 05/09/2025 - 07:55

Windows: Security updates cause problems with UAC and app installation

- September 4th, 2025

Microsoft has announced that the August 2025 Windows security updates may cause unexpected User Account Control (UAC) prompts and issues when installing apps. The bug affects non-administrator users on all...

Facebook Linkedin X

Attackers are using Velociraptor for cyberattacks. Rapid7 is aware

- September 4th, 2025

Sophos security specialists have drawn attention to a cyberattack in which unknown attackers used the open-source forensic tool Velociraptor to monitor endpoints. "In this incident, attackers used a tool to...

Facebook Linkedin X

Supercomputers: Italy ranks sixth and tenth in the 2025 TOP500 rankings.

- September 4th, 2025

The world of supercomputers has entered the era of exascale computing. The June 2025 TOP500 ranking recorded three American systems at the top, a sensational debut from Europe, and a...

Facebook Linkedin X

Underwater warfare is upon us! Will Chinese cable cutters pose a global threat?

- September 4th, 2025

The new cable cutter, developed by the China Shipbuilding Research Center, is designed for use on advanced submarines such as the Fengdou and Haidou series. The device is capable of...

Facebook Linkedin X

$16 billion in stolen Apple, Meta, and Google credentials up for sale for $121,000

- September 4th, 2025

The Darklab team, Red Hot Cyber's community of threat intelligence experts, has identified an ad on the dark web marketplace "Tor Amazon", the criminal counterpart of the popular e-commerce site...

Facebook Linkedin X

The European Union General Court “upholds” the transfer of personal data to the United States. For now

- September 4th, 2025

April 1st wasn't an April Fool's joke: the first hearing in the Latombe v. Commission case was adjourned to September 3rd for a ruling on the appeal filed for the...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE