Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...
Submarine cables are vulnerable! New strategies are needed.
Popular password managers, including LastPass, 1Password, and Bitwarden, are vulnerable to clickjacking.
Vibe Coding: Revolution or Security Risk?
Critical vulnerabilities in NetScaler ADC and Gateway. Update now! Attacks are ongoing!
The Democratization of Cybercrime Has Arrived! “I Can’t Code, But I Write Ransomware”
FreePBX under attack: Zero-day exploit already in use, emergency patch released

Submarine cables are vulnerable! New strategies are needed.
Redazione RHC - August 27th, 2025
Researchers from Reichman University (Israel) have detailed in an article in the journal Nature Electronics the growing risks and threats posed by natural and man-made factors to undersea communications cables,...

Popular password managers, including LastPass, 1Password, and Bitwarden, are vulnerable to clickjacking.
Redazione RHC - August 27th, 2025
A security expert has discovered that six of the most popular password managers, used by tens of millions of people, are vulnerable to clickjacking, a phenomenon that allows attackers to...

Vibe Coding: Revolution or Security Risk?
Redazione RHC - August 27th, 2025
Martyn Ditchburn, CTO in residence Zscaler Artificial intelligence, like any technology, is not inherently good or bad: it all depends on who uses it and for what purpose. What is...

Critical vulnerabilities in NetScaler ADC and Gateway. Update now! Attacks are ongoing!
Redazione RHC - August 27th, 2025
NetScaler has alerted administrators of three new vulnerabilities in NetScaler ADC and NetScaler Gateway, one of which is already being used in active attacks. Updates are available and the vendor...

The Democratization of Cybercrime Has Arrived! “I Can’t Code, But I Write Ransomware”
Redazione RHC - August 27th, 2025
Cybercriminals are rapidly mastering generative AI, and we're no longer talking about "scary" ransom notes, but about full-fledged malware development. The Anthropic research team reported that attackers are increasingly relying...

FreePBX under attack: Zero-day exploit already in use, emergency patch released
Luca Galuppi - August 27th, 2025
The world of VoIP telephony has once again ended up in the crosshairs of cybercriminals. This time it's FreePBX, the open-source platform built on Asterisk and widely used by companies,...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

