Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Fortinet 320x100px
LECS 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Tor Boosts Security with Counter Galois Onion CGO Encryption
Di Redazione RHC - 27/11/2025

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

Immagine del sito
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Di Redazione RHC - 26/11/2025

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Immagine del sito
Investment Scam Alert: How to Avoid Losing Thousands
Di Redazione RHC - 26/11/2025

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

Immagine del sito
Malware Uses Finger Command to Infect Windows Devices
Di Redazione RHC - 26/11/2025

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

Immagine del sito
The AGI Revolution: How Mark Gubrud’s Term Changed Tech Forever
Di Redazione RHC - 25/11/2025

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...

Submarine cables are vulnerable! New strategies are needed.

Researchers from Reichman University (Israel) have detailed in an article in the journal Nature Electronics the growing risks and threats posed by nat...
Redazione RHC - 28/08/2025 - 20:54

Popular password managers, including LastPass, 1Password, and Bitwarden, are vulnerable to clickjacking.

A security expert has discovered that six of the most popular password managers, used by tens of millions of people, are vulnerable to clickjacking, a...
Redazione RHC - 28/08/2025 - 17:56

Vibe Coding: Revolution or Security Risk?

Martyn Ditchburn, CTO in residence Zscaler Artificial intelligence, like any technology, is not inherently good or bad: it all depends on who uses ...
Redazione RHC - 28/08/2025 - 14:36

Critical vulnerabilities in NetScaler ADC and Gateway. Update now! Attacks are ongoing!

NetScaler has alerted administrators of three new vulnerabilities in NetScaler ADC and NetScaler Gateway, one of which is already being used in active...
Redazione RHC - 28/08/2025 - 14:02

The Democratization of Cybercrime Has Arrived! “I Can’t Code, But I Write Ransomware”

Cybercriminals are rapidly mastering generative AI, and we're no longer talking about "scary" ransom notes, but about full-fledged malware development...
Redazione RHC - 28/08/2025 - 13:55

FreePBX under attack: Zero-day exploit already in use, emergency patch released

The world of VoIP telephony has once again ended up in the crosshairs of cybercriminals. This time it's FreePBX, the open-source platform built on Ast...
Luca Galuppi - 28/08/2025 - 13:39

Submarine cables are vulnerable! New strategies are needed.

- August 27th, 2025

Researchers from Reichman University (Israel) have detailed in an article in the journal Nature Electronics the growing risks and threats posed by natural and man-made factors to undersea communications cables,...

Facebook Linkedin X

Popular password managers, including LastPass, 1Password, and Bitwarden, are vulnerable to clickjacking.

- August 27th, 2025

A security expert has discovered that six of the most popular password managers, used by tens of millions of people, are vulnerable to clickjacking, a phenomenon that allows attackers to...

Facebook Linkedin X

Vibe Coding: Revolution or Security Risk?

- August 27th, 2025

Martyn Ditchburn, CTO in residence Zscaler Artificial intelligence, like any technology, is not inherently good or bad: it all depends on who uses it and for what purpose. What is...

Facebook Linkedin X

Critical vulnerabilities in NetScaler ADC and Gateway. Update now! Attacks are ongoing!

- August 27th, 2025

NetScaler has alerted administrators of three new vulnerabilities in NetScaler ADC and NetScaler Gateway, one of which is already being used in active attacks. Updates are available and the vendor...

Facebook Linkedin X

The Democratization of Cybercrime Has Arrived! “I Can’t Code, But I Write Ransomware”

- August 27th, 2025

Cybercriminals are rapidly mastering generative AI, and we're no longer talking about "scary" ransom notes, but about full-fledged malware development. The Anthropic research team reported that attackers are increasingly relying...

Facebook Linkedin X

FreePBX under attack: Zero-day exploit already in use, emergency patch released

- August 27th, 2025

The world of VoIP telephony has once again ended up in the crosshairs of cybercriminals. This time it's FreePBX, the open-source platform built on Asterisk and widely used by companies,...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE