Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
2nd Edition GlitchZone RHC 320x100 2
Redhotcyber Banner Sito 970x120px Uscita 101125

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Tor Boosts Security with Counter Galois Onion CGO Encryption
Di Redazione RHC - 27/11/2025

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

Immagine del sito
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Di Redazione RHC - 26/11/2025

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Immagine del sito
Investment Scam Alert: How to Avoid Losing Thousands
Di Redazione RHC - 26/11/2025

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

Immagine del sito
Malware Uses Finger Command to Infect Windows Devices
Di Redazione RHC - 26/11/2025

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

Immagine del sito
The AGI Revolution: How Mark Gubrud’s Term Changed Tech Forever
Di Redazione RHC - 25/11/2025

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...

BruteForceAI: When AI Learns to Hack Logins Better Than a Human Hacker

BruteForceAI is a new penetration testing framework that combines artificial intelligence and automation to take brute-force to the next level. Develo...
Redazione RHC - 01/09/2025 - 15:00

Critical Linux Vulnerability: CVSS 8.5 Vulnerability Discovered in UDisks Daemon

A critical security flaw in the Linux UDisks daemon was recently discovered, allowing potential unprivileged attackers to access files belonging to hi...
Redazione RHC - 01/09/2025 - 13:50

Transparency and Resilience: NIST Publishes Meta-Framework to Change Supply Chain Management

The National Institute of Standards and Technology (NIST), through its National Cybersecurity Center of Excellence (NCCoE), has introduced a decentral...
Redazione RHC - 01/09/2025 - 12:41

LilyGO T-Embed CC1101 and Bruce Firmware, the community makes studying Rolling Code possible

Research into radio frequency security never stops. In recent years, we've seen the emergence of increasingly accessible tools that have brought the w...
Diego Bentivoglio - 01/09/2025 - 10:33

New AI-powered stethoscope now delivers cardiac diagnoses in 15 seconds

British doctors have tested an advanced stethoscope equipped with artificial intelligence capable of detecting three serious heart conditions in just ...
Redazione RHC - 01/09/2025 - 10:14

WhatsApp wins $167 million lawsuit against NSO and its Pegasus spyware

A major legal breakthrough is upon us. A US court has ordered NSO Group, a notorious spyware maker, to pay $167 million to WhatsApp. This ruling stems...
Redazione RHC - 01/09/2025 - 09:37

BruteForceAI: When AI Learns to Hack Logins Better Than a Human Hacker

- August 31st, 2025

BruteForceAI is a new penetration testing framework that combines artificial intelligence and automation to take brute-force to the next level. Developed by Mor David, the tool uses large language models...

Facebook Linkedin X

Critical Linux Vulnerability: CVSS 8.5 Vulnerability Discovered in UDisks Daemon

- August 31st, 2025

A critical security flaw in the Linux UDisks daemon was recently discovered, allowing potential unprivileged attackers to access files belonging to highly privileged users. The vulnerability, classified as CVE-2025-8067, was...

Facebook Linkedin X

Transparency and Resilience: NIST Publishes Meta-Framework to Change Supply Chain Management

- August 31st, 2025

The National Institute of Standards and Technology (NIST), through its National Cybersecurity Center of Excellence (NCCoE), has introduced a decentralized data approach to help manufacturers and critical infrastructure sectors protect...

Facebook Linkedin X

LilyGO T-Embed CC1101 and Bruce Firmware, the community makes studying Rolling Code possible

- August 31st, 2025

Research into radio frequency security never stops. In recent years, we've seen the emergence of increasingly accessible tools that have brought the world of RF hacking beyond academic laboratories. One...

Facebook Linkedin X

New AI-powered stethoscope now delivers cardiac diagnoses in 15 seconds

- August 31st, 2025

British doctors have tested an advanced stethoscope equipped with artificial intelligence capable of detecting three serious heart conditions in just 15 seconds. Practical results of the study showed that the...

Facebook Linkedin X

WhatsApp wins $167 million lawsuit against NSO and its Pegasus spyware

- August 31st, 2025

A major legal breakthrough is upon us. A US court has ordered NSO Group, a notorious spyware maker, to pay $167 million to WhatsApp. This ruling stems from a 2019...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE