Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Enterprise BusinessLog 320x200 1
LECS 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Tor Boosts Security with Counter Galois Onion CGO Encryption
Di Redazione RHC - 27/11/2025

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

Immagine del sito
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Di Redazione RHC - 26/11/2025

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Immagine del sito
Investment Scam Alert: How to Avoid Losing Thousands
Di Redazione RHC - 26/11/2025

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

Immagine del sito
Malware Uses Finger Command to Infect Windows Devices
Di Redazione RHC - 26/11/2025

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

Immagine del sito
The AGI Revolution: How Mark Gubrud’s Term Changed Tech Forever
Di Redazione RHC - 25/11/2025

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...

Navy and Marine Corps test hydrogen balloon and drone surveillance system

At Outlying Landing Field Seagle in California, the U.S. Navy and Marine Corps tested a new system that allows ships to "see beyond the horizon." F...
Redazione RHC - 31/08/2025 - 13:40

Microsoft denies that the August update damaged SSDs: Users say otherwise.

Microsoft has denied that the August Windows 11 security update is linked to mass complaints of storage device failures. The investigation was launche...
Redazione RHC - 31/08/2025 - 13:26

GitHub and GitLab are increasingly under fire! Targeted attacks targeting developers via fake repositories

By hosting fake projects on popular development platforms (GitHub and GitLab), attackers trick users into running malicious payloads that pull add-ons...
Redazione RHC - 31/08/2025 - 10:21

Meta’s AI bots use avatars of minors and celebrities: a storm erupts.

Meta found itself at the center of a scandal after a Reuters investigation revealed that AI-powered chatbots that mimicked celebrities were being dist...
Redazione RHC - 31/08/2025 - 10:16

Sindoor Dropper: The Malware Using the India-Pakistan Clash to Infect Linux

An insidious malware attack known as "Sindoor Dropper" targets Linux operating systems, leveraging sophisticated spear-phishing methods and a complex,...
Redazione RHC - 31/08/2025 - 10:04

Iranian cyber attacks disrupt Gaza ceasefire negotiations

Mediation efforts led by Arab nations to secure the release of Israelis held by Hamas and a ceasefire in Gaza have been interrupted by cyber attacks f...
Redazione RHC - 31/08/2025 - 09:56

Navy and Marine Corps test hydrogen balloon and drone surveillance system

- August 30th, 2025

At Outlying Landing Field Seagle in California, the U.S. Navy and Marine Corps tested a new system that allows ships to "see beyond the horizon." From May 19 to 21,...

Facebook Linkedin X

Microsoft denies that the August update damaged SSDs: Users say otherwise.

- August 30th, 2025

Microsoft has denied that the August Windows 11 security update is linked to mass complaints of storage device failures. The investigation was launched following reports from users who, after installing...

Facebook Linkedin X

GitHub and GitLab are increasingly under fire! Targeted attacks targeting developers via fake repositories

- August 30th, 2025

By hosting fake projects on popular development platforms (GitHub and GitLab), attackers trick users into running malicious payloads that pull add-ons from a hacker-controlled repository. As a result, remote access...

Facebook Linkedin X

Meta’s AI bots use avatars of minors and celebrities: a storm erupts.

- August 30th, 2025

Meta found itself at the center of a scandal after a Reuters investigation revealed that AI-powered chatbots that mimicked celebrities were being distributed on the company's platforms. These virtual characters,...

Facebook Linkedin X

Sindoor Dropper: The Malware Using the India-Pakistan Clash to Infect Linux

- August 30th, 2025

An insidious malware attack known as "Sindoor Dropper" targets Linux operating systems, leveraging sophisticated spear-phishing methods and a complex, multi-stage infection process. The insidious operation targets users with lures related...

Facebook Linkedin X

Iranian cyber attacks disrupt Gaza ceasefire negotiations

- August 30th, 2025

Mediation efforts led by Arab nations to secure the release of Israelis held by Hamas and a ceasefire in Gaza have been interrupted by cyber attacks from Iran, a cybersecurity...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE