Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...
Moscow hires hackers who attacked the Electronic School in 2022 to improve it
Want a free PDF editor? You downloaded malware included in the premium package.
Critical vulnerabilities are on the rise! Awareness, Patching, and Audits are key.
Iran Cyber Army: Spear-phishing attacks against governments around the world (including Italy!)
China unveils KylinOS11 with AI integration: the national operating system that will replace Windows
The Dawn supercomputer takes the fight against cancer: a new era of research with AI

Moscow hires hackers who attacked the Electronic School in 2022 to improve it
Redazione RHC - August 29th, 2025
Participants in the cyberattack on the Moscow Electronic School were offered towork to improve cybersecurity and other digital services of the capital's administration. This all comes after September 17, 2022,...

Want a free PDF editor? You downloaded malware included in the premium package.
Redazione RHC - August 29th, 2025
A complex malware campaign has been discovered, targeting users searching for free PDF editing software. A malicious application, disguised as a legitimate "AppSuite PDF Editor", is being spread by cybercriminals....

Critical vulnerabilities are on the rise! Awareness, Patching, and Audits are key.
Redazione RHC - August 29th, 2025
According to a Kaspersky Lab report, the use of vulnerabilities increased significantly in the second quarter of 2025: almost every subsystem of modern computers was attacked, from UEFI to browser...

Iran Cyber Army: Spear-phishing attacks against governments around the world (including Italy!)
Redazione RHC - August 28th, 2025
A recent Cyber Threat Intelligence (CTI) analysis conducted by DREAM has revealed details of a complex spear-phishing campaign that occurred in August 2025. The attack, attributed to an Iran-aligned group...

China unveils KylinOS11 with AI integration: the national operating system that will replace Windows
Redazione RHC - August 28th, 2025
China has unveiled KylinOS11, the largest update to its national operating system, which the government called a major step forward in creating an independent technology ecosystem. The new version runs...

The Dawn supercomputer takes the fight against cancer: a new era of research with AI
Redazione RHC - August 28th, 2025
The project "A basic model for cancer vaccine design" has been shortlisted for an award from the UK government's prestigious AI Research Resource (AIRR) initiative, led by the Department for...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

