Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...
IBM and AMD Create New Architectures Between Quantum Computing and High-Performance Computing (HPC)
DarkMirror H1 2025 Released: Dark Lab’s Ransomware Threat Report
Shocking law in Russia: searching for prohibited content on the web becomes an administrative offense.
Managed SOC: A Strategic Choice for Corporate Cybersecurity
Tesla under fire! The hacker hired by the victims recovers data deleted in the fatal crash.
Fiber Computers Are Coming! E-textiles Are Coming, the Smart Fabric Revolution

IBM and AMD Create New Architectures Between Quantum Computing and High-Performance Computing (HPC)
Redazione RHC - August 31st, 2025
IBM and AMD will develop new computing architectures at the intersection of quantum and classical approaches, writes the AMD press office. Executives from IBM and AMD announced a partnership in...

DarkMirror H1 2025 Released: Dark Lab’s Ransomware Threat Report
Redazione RHC - August 31st, 2025
Ransomware continues to represent one of the most pervasive and damaging threats in the global cybersecurity landscape. In the regular "DarkMirror" report produced by Red Hot Cyber's DarkLab intelligence laboratory,...

Shocking law in Russia: searching for prohibited content on the web becomes an administrative offense.
Redazione RHC - August 31st, 2025
In Russia, a law amending fines from 3,000 to 5,000 rubles for deliberately searching for extremist material on the Internet, including using a VPN, came into force on September 1....

Managed SOC: A Strategic Choice for Corporate Cybersecurity
Redazione RHC - August 31st, 2025
In recent years, companies have faced a radical shift in managing their cybersecurity. The growing complexity of digital infrastructures, the spread of remote working, the progressive adoption of the cloud,...

Tesla under fire! The hacker hired by the victims recovers data deleted in the fatal crash.
Redazione RHC - August 30th, 2025
An independent hacker has uncovered hidden data related to a fatal accident involving a Tesla in Florida in 2019, reigniting the debate over the automaker's transparency and setting an unprecedented...

Fiber Computers Are Coming! E-textiles Are Coming, the Smart Fabric Revolution
Redazione RHC - August 30th, 2025
Scientists have assembled the key elements of a computing system into a single, flexible, and even machine-washable thread. The idea is to weave many of these threads into fabric to...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

