Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...
Trump meets with all the AI tech leaders at the White House. Elon Musk is notably absent!
Red Hot Cyber Conference 2026: Sponsorships Open for the Fifth Edition in Rome
Hexstrike AI unleashes chaos! Zero-days exploited in record time
Microsoft Introduces POML for Orchestrating LLM Prompts
CISO vs. DPO: Collaboration or Cold War in Business?
Revolutionize security models with the Unified SASE framework

Trump meets with all the AI tech leaders at the White House. Elon Musk is notably absent!
Redazione RHC - September 3rd, 2025
Today, Thursday, September 4, 2025, US President Donald Trump will host over two dozen technology and business leaders for a dinner in the newly renovated White House Rose Garden. An...

Red Hot Cyber Conference 2026: Sponsorships Open for the Fifth Edition in Rome
Redazione RHC - September 3rd, 2025
The Red Hot Cyber Conference has become a regular event for the Red Hot Cyber community and for anyone working in or interested in the world of digital technologies and...

Hexstrike AI unleashes chaos! Zero-days exploited in record time
Redazione RHC - September 3rd, 2025
The release of Hexstrike-AI marks a turning point in the cybersecurity landscape. The framework, billed as a next-generation tool for red teams and researchers, is capable of orchestrating over 150...

Microsoft Introduces POML for Orchestrating LLM Prompts
Redazione RHC - September 3rd, 2025
Microsoft today introduced POML (Prompt Orchestration Markup Language), a new markup language for prompt orchestration and specifically designed to enable rapid and structured prototyping of large language models (LLMs). POML...

CISO vs. DPO: Collaboration or Cold War in Business?
Stefano Gazzella - September 3rd, 2025
Managing security is far from simple, it's not something that can be standardized, and above all, it can't be achieved through "solutions." It requires planning, analysis, and the ability to...

Revolutionize security models with the Unified SASE framework
Redazione RHC - September 3rd, 2025
A unified and secure approach to support digital transformation, enable hybrid working, and reduce operational complexity. By Federico Saraò, Specialized System Engineer SASE, Fortinet Italy The nature of a company's...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

