Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...
Critical vulnerability in IIS Web Deploy: PoC exploit is now public
Tencent Challenges the Giants! New Hunyuan-MT Beats Google Translate and GPT-4.1
OpenAI Puts Parents in Control: Parental Controls Arrive on ChatGPT
Lovable, the Swedish AI unicorn that’s revolutionizing programming
Open Data and Big Data: Data Management and a Comparison of Hadoop vs. Spark
Trend Micro: Beware of the “Task Scam,” the scam targeting online job seekers.

Critical vulnerability in IIS Web Deploy: PoC exploit is now public
Redazione RHC - September 2nd, 2025
This week, a proof-of-concept exploit was published for CVE-2025-53772, a critical remote code execution vulnerability in Microsoft's IIS Web Deploy (msdeploy) tool, which has raised urgent alarms in the .NET...

Tencent Challenges the Giants! New Hunyuan-MT Beats Google Translate and GPT-4.1
Redazione RHC - September 2nd, 2025
Chinese company Tencent has made public the source code of a new set of Hunyuan-MT language models, specially optimized for translation tasks. The developers claim that the algorithms perform better...

OpenAI Puts Parents in Control: Parental Controls Arrive on ChatGPT
Redazione RHC - September 2nd, 2025
At a time when controversy over the impact of artificial intelligence on youth mental health is growing, the introduction of parental controls for ChatGPT has been announced as a measure...

Lovable, the Swedish AI unicorn that’s revolutionizing programming
Redazione RHC - September 2nd, 2025
This year's TechBBQ conference was packed to capacity at Copenhagen's Bella Center when Anton Osika, co-founder of the AI-powered programming app Lovable, took the stage. The fundamental concept of Lovable...

Open Data and Big Data: Data Management and a Comparison of Hadoop vs. Spark
Antonino Battaglia - September 2nd, 2025
Today, for all large companies, data represents a strategic resource of primary importance. Thanks to the information obtained, it is possible to establish decision-making strategies that, in every sector, can...

Trend Micro: Beware of the “Task Scam,” the scam targeting online job seekers.
Redazione RHC - September 2nd, 2025
The latest research from the security leader reveals the fraudulent mechanisms behind fake job opportunities offered by digital platforms The number of victims of the "Task scam" is increasing worldwide,...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

