Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...
China launches compact space debris removal system
What is Wetware: The Future of Brain Enhancement Through Hardware and Software
AI browser extensions? There’s too much uncertainty: the risk still lies in user awareness!
Little engineers for big robots! Is Italy also focusing on young people?
Phishing on Teams: at least the hacker responds faster than the real help desk!
It’s a global cyber shock! Beijing’s 007s are infiltrating and compromising the world’s Internet backbones.

China launches compact space debris removal system
Redazione RHC - August 28th, 2025
Chinese scientists have unveiled a compact space launcher, initially designed to remove dangerous space debris, but which could potentially be used as a weapon. The project was conceived by engineers...

What is Wetware: The Future of Brain Enhancement Through Hardware and Software
Massimiliano Brolli - August 28th, 2025
By definition, wetware refers to technology that combines hardware and software to enhance biological life forms. Steve M. Potter, an associate professor at the Neuroengineering Laboratory at the University of...

AI browser extensions? There’s too much uncertainty: the risk still lies in user awareness!
Redazione RHC - August 28th, 2025
Anthropic has raised the alarm about a new threat related to "smart" browser extensions: Websites can infiltrate hidden commands that an AI agent will execute without thinking. Anthropic has released...

Little engineers for big robots! Is Italy also focusing on young people?
Redazione RHC - August 28th, 2025
In Stavropol, Russian Federation, the race for the regional robotics championship for younger students has officially begun. Applications can be submitted starting August 25th, with a window that will remain...

Phishing on Teams: at least the hacker responds faster than the real help desk!
Redazione RHC - August 28th, 2025
In recent months, as previously reported on Red Hot Cyber, a new front has emerged in the corporate phishing landscape: Microsoft Teams attacks in which attackers impersonate IT or help...

It’s a global cyber shock! Beijing’s 007s are infiltrating and compromising the world’s Internet backbones.
Redazione RHC - August 28th, 2025
The United States and several allied countries have issued a joint warning about a growing cyber offensive conducted by actors sponsored by the People's Republic of China. According to a...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

