Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
320x100 Itcentric
UtiliaCS 970x120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Tor Boosts Security with Counter Galois Onion CGO Encryption
Di Redazione RHC - 27/11/2025

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

Immagine del sito
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Di Redazione RHC - 26/11/2025

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Immagine del sito
Investment Scam Alert: How to Avoid Losing Thousands
Di Redazione RHC - 26/11/2025

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

Immagine del sito
Malware Uses Finger Command to Infect Windows Devices
Di Redazione RHC - 26/11/2025

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

Immagine del sito
The AGI Revolution: How Mark Gubrud’s Term Changed Tech Forever
Di Redazione RHC - 25/11/2025

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...

Critical vulnerability in IIS Web Deploy: PoC exploit is now public

This week, a proof-of-concept exploit was published for CVE-2025-53772, a critical remote code execution vulnerability in Microsoft's IIS Web Deploy (...
Redazione RHC - 03/09/2025 - 12:30

Tencent Challenges the Giants! New Hunyuan-MT Beats Google Translate and GPT-4.1

Chinese company Tencent has made public the source code of a new set of Hunyuan-MT language models, specially optimized for translation tasks. The dev...
Redazione RHC - 03/09/2025 - 09:54

OpenAI Puts Parents in Control: Parental Controls Arrive on ChatGPT

At a time when controversy over the impact of artificial intelligence on youth mental health is growing, the introduction of parental controls for Cha...
Redazione RHC - 03/09/2025 - 08:59

Lovable, the Swedish AI unicorn that’s revolutionizing programming

This year's TechBBQ conference was packed to capacity at Copenhagen's Bella Center when Anton Osika, co-founder of the AI-powered programming app Lova...
Redazione RHC - 03/09/2025 - 08:00

Open Data and Big Data: Data Management and a Comparison of Hadoop vs. Spark

Today, for all large companies, data represents a strategic resource of primary importance. Thanks to the information obtained, it is possible to esta...
Antonino Battaglia - 03/09/2025 - 07:39

Trend Micro: Beware of the “Task Scam,” the scam targeting online job seekers.

The latest research from the security leader reveals the fraudulent mechanisms behind fake job opportunities offered by digital platforms The numbe...
Redazione RHC - 03/09/2025 - 07:34

Critical vulnerability in IIS Web Deploy: PoC exploit is now public

- September 2nd, 2025

This week, a proof-of-concept exploit was published for CVE-2025-53772, a critical remote code execution vulnerability in Microsoft's IIS Web Deploy (msdeploy) tool, which has raised urgent alarms in the .NET...

Facebook Linkedin X

Tencent Challenges the Giants! New Hunyuan-MT Beats Google Translate and GPT-4.1

- September 2nd, 2025

Chinese company Tencent has made public the source code of a new set of Hunyuan-MT language models, specially optimized for translation tasks. The developers claim that the algorithms perform better...

Facebook Linkedin X

OpenAI Puts Parents in Control: Parental Controls Arrive on ChatGPT

- September 2nd, 2025

At a time when controversy over the impact of artificial intelligence on youth mental health is growing, the introduction of parental controls for ChatGPT has been announced as a measure...

Facebook Linkedin X

Lovable, the Swedish AI unicorn that’s revolutionizing programming

- September 2nd, 2025

This year's TechBBQ conference was packed to capacity at Copenhagen's Bella Center when Anton Osika, co-founder of the AI-powered programming app Lovable, took the stage. The fundamental concept of Lovable...

Facebook Linkedin X

Open Data and Big Data: Data Management and a Comparison of Hadoop vs. Spark

- September 2nd, 2025

Today, for all large companies, data represents a strategic resource of primary importance. Thanks to the information obtained, it is possible to establish decision-making strategies that, in every sector, can...

Facebook Linkedin X

Trend Micro: Beware of the “Task Scam,” the scam targeting online job seekers.

- September 2nd, 2025

The latest research from the security leader reveals the fraudulent mechanisms behind fake job opportunities offered by digital platforms The number of victims of the "Task scam" is increasing worldwide,...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE