Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Enterprise BusinessLog 320x200 1
TM RedHotCyber 970x120 042543

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Tor Boosts Security with Counter Galois Onion CGO Encryption
Di Redazione RHC - 27/11/2025

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

Immagine del sito
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Di Redazione RHC - 26/11/2025

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Immagine del sito
Investment Scam Alert: How to Avoid Losing Thousands
Di Redazione RHC - 26/11/2025

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

Immagine del sito
Malware Uses Finger Command to Infect Windows Devices
Di Redazione RHC - 26/11/2025

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

Immagine del sito
The AGI Revolution: How Mark Gubrud’s Term Changed Tech Forever
Di Redazione RHC - 25/11/2025

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...

Let the hunt begin! Hackers exploit Citrix flaw to infiltrate global systems

A critical zero-day flaw, classified as CVE-2025-6543, has been discovered in Citrix NetScaler systems. This vulnerability has been actively exploited...
Redazione RHC - 30/08/2025 - 20:30

The Pentagon launches an audit of Microsoft. It investigates Chinese engineers and alleged backdoors.

The Pentagon has sent a "letter of concern" to Microsoft documenting a "breach of trust" regarding the company's use of Chinese engineers to maintain ...
Redazione RHC - 30/08/2025 - 17:06

Amazon Stops APT29: Sophisticated Russian Watering Hole Campaign Foiled

A complex watering hole campaign, orchestrated by the notorious hacker group APT29, linked to Russian foreign intelligence services, was neutralized b...
Redazione RHC - 30/08/2025 - 15:58

The best defense is a good offense! Google is ready to launch cyber attacks against criminal hackers.

Google is poised to adopt a more proactive stance to protect itself and potentially other U.S. organizations from cyberattacks, with the company sugge...
Redazione RHC - 30/08/2025 - 13:57

A zero-click exploit for WhatsApp allowed remote surveillance. Meta warns victims.

A security flaw in WhatsApp's messaging apps for Apple iOS and macOS has been patched, the company reported, after likely being widely exploited along...
Redazione RHC - 30/08/2025 - 10:56

Google warns 2.5 billion Gmail users: account security at risk. Reset your password!

A far-reaching security advisory has been issued by Google to the 2.5 billion users of its Gmail service, aiming to strengthen the protection of their...
Redazione RHC - 30/08/2025 - 10:39

Let the hunt begin! Hackers exploit Citrix flaw to infiltrate global systems

- August 29th, 2025

A critical zero-day flaw, classified as CVE-2025-6543, has been discovered in Citrix NetScaler systems. This vulnerability has been actively exploited by malicious hackers since May 2025, several months before a...

Facebook Linkedin X

The Pentagon launches an audit of Microsoft. It investigates Chinese engineers and alleged backdoors.

- August 29th, 2025

The Pentagon has sent a "letter of concern" to Microsoft documenting a "breach of trust" regarding the company's use of Chinese engineers to maintain sensitive government computer systems, Defense Secretary...

Facebook Linkedin X

Amazon Stops APT29: Sophisticated Russian Watering Hole Campaign Foiled

- August 29th, 2025

A complex watering hole campaign, orchestrated by the notorious hacker group APT29, linked to Russian foreign intelligence services, was neutralized by Amazon's cybersecurity team. This latest campaign marks a significant...

Facebook Linkedin X

The best defense is a good offense! Google is ready to launch cyber attacks against criminal hackers.

- August 29th, 2025

Google is poised to adopt a more proactive stance to protect itself and potentially other U.S. organizations from cyberattacks, with the company suggesting it may assume the role of attacker...

Facebook Linkedin X

A zero-click exploit for WhatsApp allowed remote surveillance. Meta warns victims.

- August 29th, 2025

A security flaw in WhatsApp's messaging apps for Apple iOS and macOS has been patched, the company reported, after likely being widely exploited alongside a recently discovered Apple vulnerability in...

Facebook Linkedin X

Google warns 2.5 billion Gmail users: account security at risk. Reset your password!

- August 29th, 2025

A far-reaching security advisory has been issued by Google to the 2.5 billion users of its Gmail service, aiming to strengthen the protection of their accounts following a data breach...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE