Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...
Android Colabrodo Edition: 120 vulnerabilities and two zero-days fixed
Chess.com Data Breach! Free Services for Affected Users
From Commodore 64 to GitHub! Gates and Allen’s BASIC goes open source after 48 years.
New Wave of Quishing Attacks: Innovative Tactics from Cybercriminals
Netshacker: Retrogaming e Hacking Reale su Commodore 64
NotDoor Arrives: APT28’s Microsoft Outlook Backdoor

Android Colabrodo Edition: 120 vulnerabilities and two zero-days fixed
Redazione RHC - September 4th, 2025
Google developers have released security updates for Android that address 120 operating system vulnerabilities. Two of these vulnerabilities, according to the company, have already been exploited by hackers in targeted...

Chess.com Data Breach! Free Services for Affected Users
Redazione RHC - September 4th, 2025
Chess.com, the online chess giant, has reportedly suffered a data breach that exposed the personal information of 4,541 individuals, according to a filing with the Maine Attorney General's Office. The...

From Commodore 64 to GitHub! Gates and Allen’s BASIC goes open source after 48 years.
Redazione RHC - September 3rd, 2025
Microsoft has officially released the source code for its first version of BASIC for the MOS 6502 processor. For decades, it existed only in the form of leaks, museum copies,...

New Wave of Quishing Attacks: Innovative Tactics from Cybercriminals
Redazione RHC - September 3rd, 2025
In recent years, a particularly insidious form of phishing has become widespread: Quishing or QRishing, a strategy based on the use of QR codes containing malicious links that, once scanned,...

Netshacker: Retrogaming e Hacking Reale su Commodore 64
Marcello Filacchioni - September 3rd, 2025
In the Commodore 64 gaming landscape, Netshacker stands out as a project that challenges the conventions of modern gaming, taking gamers back to the roots of 1980s home computing. This...

NotDoor Arrives: APT28’s Microsoft Outlook Backdoor
Redazione RHC - September 3rd, 2025
An advanced backdoor system associated with the notorious Russian cyberespionage group APT28 allows attackers to download data, upload files, and issue commands to infected PCs. This recently discovered, next-generation backdoor...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

