Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...
Auchan data leak: hundreds of thousands of customers affected by a hacker attack
Critical vulnerability in Docker Desktop: host system compromise
PromptLock Arrives. The First Artificial Intelligence-Powered Ransomware for Windows and Linux
UNC6395 campaign aims to exfiltrate Salesforce data via compromised OAuth tokens
Supercomputer: Fugaku NEXT will be Japan’s first zetta-class supercomputer
Intel Website Vulnerabilities: 270,000 Employees at Risk

Auchan data leak: hundreds of thousands of customers affected by a hacker attack
Redazione RHC - August 26th, 2025
French retailer Auchan has informed hundreds of thousands of customers that their personal data has been stolen following a hacker attack. In notifications sent to users last week, the company...

Critical vulnerability in Docker Desktop: host system compromise
Redazione RHC - August 26th, 2025
A critical vulnerability in the desktop version of Docker for Windows and macOS allowed a host system to be compromised by running a malicious container, even with Enhanced Container Isolation...

PromptLock Arrives. The First Artificial Intelligence-Powered Ransomware for Windows and Linux
Redazione RHC - August 26th, 2025
Finally (metaphorically speaking), we're here. ESET experts have reported the first ransomware program in which artificial intelligence plays a key role. The new sample has been named PromptLock. It is...

UNC6395 campaign aims to exfiltrate Salesforce data via compromised OAuth tokens
Redazione RHC - August 26th, 2025
A sophisticated data exfiltration campaign targeting companies' Salesforce instances was conducted, resulting in the exposure of sensitive information from several organizations. This occurred through compromised OAuth tokens associated with the...

Supercomputer: Fugaku NEXT will be Japan’s first zetta-class supercomputer
Redazione RHC - August 26th, 2025
RIKEN, Fujitsu, and Nvidia are collaborating on the development of FugakuNEXT, Japan's new flagship supercomputer, scheduled to become operational at the RIKEN campus in Kobe around 2030. With an estimated...

Intel Website Vulnerabilities: 270,000 Employees at Risk
Redazione RHC - August 25th, 2025
An attack on Intel's internal resources has demonstrated that vulnerabilities can be found not only in processors, but also in company websites. A security researcher discovered four different ways to...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

