Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...
Zscaler Data Breach: Lessons Learned About the Evolution of SaaS Threats
Zscaler Suffers Data Breach: Supply Chain Attack Via Salesloft Drift
The new cybersecurity battlefield? Your brain!
Wikipedia under the US Congress’s scrutiny: when freedom of expression becomes “under special surveillance”
From AI chatbots to global data theft: The Drift flaw rocks Google Workspace.
Confidentiality vs. Privacy: The Concept Everyone Confuses (and Why It’s Dangerous)

Zscaler Data Breach: Lessons Learned About the Evolution of SaaS Threats
Ada Spinelli - September 1st, 2025
Zscaler's recent confirmation of a data breach resulting from a supply chain attack provides a case study in the evolution of threats against complex SaaS ecosystems. The attack, attributed to...

Zscaler Suffers Data Breach: Supply Chain Attack Via Salesloft Drift
Redazione RHC - September 1st, 2025
A large-scale cyberattack has targeted security firm Zscaler, which has officially confirmed it was the victim of a supply chain breach. This attack exposed customer contact data due to compromised...

The new cybersecurity battlefield? Your brain!
Daniela Farina - September 1st, 2025
Welcome to the first installment of our series, a three-week journey exploring the extraordinary dance between coevolution, cybersecurity, and the humanities, with a focus on coaching. Each week, we'll tackle...

Wikipedia under the US Congress’s scrutiny: when freedom of expression becomes “under special surveillance”
Sandro Sana - September 1st, 2025
On August 27, 2025, the Wikimedia Foundation, which operates Wikipedia, received an official letter from the Committee on Oversight and Government Reform of the United States House of Representatives.The letter,...

From AI chatbots to global data theft: The Drift flaw rocks Google Workspace.
Redazione RHC - September 1st, 2025
Last week, it emerged that criminal hackers had compromised the sales automation platform Salesloft and stolen OAuth and update tokens from customers in its AI agent Drift, designed to integrate...

Confidentiality vs. Privacy: The Concept Everyone Confuses (and Why It’s Dangerous)
Antonino Battaglia - September 1st, 2025
Every day we hear about privacy in every aspect of our lives, so much so that the term has entered common parlance. But what does it really mean? What happens...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

