Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Crowdstrike 320×100
UtiliaCS 970x120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Tor Boosts Security with Counter Galois Onion CGO Encryption
Di Redazione RHC - 27/11/2025

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

Immagine del sito
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Di Redazione RHC - 26/11/2025

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Immagine del sito
Investment Scam Alert: How to Avoid Losing Thousands
Di Redazione RHC - 26/11/2025

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

Immagine del sito
Malware Uses Finger Command to Infect Windows Devices
Di Redazione RHC - 26/11/2025

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

Immagine del sito
The AGI Revolution: How Mark Gubrud’s Term Changed Tech Forever
Di Redazione RHC - 25/11/2025

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...

Palo Alto Networks Also Compromised via Salesforce and Drift

In early September 2025, Palo Alto Networks confirmed it had been the victim of a data breach. The compromise did not affect its core products or serv...
Antonio Piazzolla - 02/09/2025 - 22:27

The Battle Between OnlyFans and Google: Piracy, AI, and the Chaos of Automated Copyright

The massive clash between adult content creators and pirates, now transferred to automated copyright protection systems, is beginning to radically cha...
Redazione RHC - 02/09/2025 - 19:36

Was there terror on Ursula von der Leyen’s flight? Let’s clear things up!

On August 31, 2025, flight AAB53G, operated by a Dassault Falcon 900LX registered OO-GPE and carrying European Commission President Ursula von der Ley...
Giovanni Pollola - 02/09/2025 - 17:47

Video Surveillance Under Attack: A Hikvision Bug Allows Admin Access Without a Login

At the end of August 2025, a high-impact vulnerability affecting HikCentral Professional, the Hikvision platform used to centrally manage video survei...
Antonio Piazzolla - 02/09/2025 - 17:39

Nearly a third of web traffic is generated by bots! The era of invasive AI is now

Yesterday, the Red Hot Cyber website was inaccessible for about an hour. But what's going on, we wondered? After a series of analyses, here's the resu...
Redazione RHC - 02/09/2025 - 14:50

Lazarus APT: 3 Advanced RATs for Cryptocurrency Financial Organizations

Recently, an advanced subgroup linked to the notorious threat actor Lazarus was detected distributing three different remote access Trojans (RATs) wit...
Redazione RHC - 02/09/2025 - 14:38

Palo Alto Networks Also Compromised via Salesforce and Drift

- September 1st, 2025

In early September 2025, Palo Alto Networks confirmed it had been the victim of a data breach. The compromise did not affect its core products or services, but rather some...

Facebook Linkedin X

The Battle Between OnlyFans and Google: Piracy, AI, and the Chaos of Automated Copyright

- September 1st, 2025

The massive clash between adult content creators and pirates, now transferred to automated copyright protection systems, is beginning to radically change the face of the Internet. Every day, it becomes...

Facebook Linkedin X

Was there terror on Ursula von der Leyen’s flight? Let’s clear things up!

- September 1st, 2025

On August 31, 2025, flight AAB53G, operated by a Dassault Falcon 900LX registered OO-GPE and carrying European Commission President Ursula von der Leyen, took off from Warsaw and landed safely...

Facebook Linkedin X

Video Surveillance Under Attack: A Hikvision Bug Allows Admin Access Without a Login

- September 1st, 2025

At the end of August 2025, a high-impact vulnerability affecting HikCentral Professional, the Hikvision platform used to centrally manage video surveillance and access control, was disclosed. The flaw, classified as...

Facebook Linkedin X

Nearly a third of web traffic is generated by bots! The era of invasive AI is now

- September 1st, 2025

Yesterday, the Red Hot Cyber website was inaccessible for about an hour. But what's going on, we wondered? After a series of analyses, here's the result: the internet is changing...

Facebook Linkedin X

Lazarus APT: 3 Advanced RATs for Cryptocurrency Financial Organizations

- September 1st, 2025

Recently, an advanced subgroup linked to the notorious threat actor Lazarus was detected distributing three different remote access Trojans (RATs) within compromised financial and cryptocurrency organizations. Initial access was achieved...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE