Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...
Father and son wanted by the FBI. $10 million reward for hackers who collaborated with the GRU.
Trial underway for the four damaged internet cables in the Baltic Sea. The captain: “I am not accused of any wrongdoing.”
The US Army evolves: more power for cyber and electronic operations
19 million installs of 77APP spread malware on Google Play
Happy birthday Windows 95: the system that changed PCs forever!
Stagershell: When malware leaves no trace. Malware Forge analysis.

Father and son wanted by the FBI. $10 million reward for hackers who collaborated with the GRU.
Redazione RHC - August 25th, 2025
The FBI is offering a generous reward for anyone who can help find Amin Stigal, 23, and Timur Stigal, 47, a father and son team. They are accused of hacking...

Trial underway for the four damaged internet cables in the Baltic Sea. The captain: “I am not accused of any wrongdoing.”
Redazione RHC - August 25th, 2025
The trial has begun for the crew of the oil tanker Eagle S, which tore several undersea cables in the Gulf of Finland in 2024. The captain of the tanker...

The US Army evolves: more power for cyber and electronic operations
Redazione RHC - August 25th, 2025
The U.S. Army is increasingly investing in reintroducing electronic warfare capabilities among its troops, planning to equip division-level units with advanced cyber tools over the next two years. This development...

19 million installs of 77APP spread malware on Google Play
Redazione RHC - August 25th, 2025
Zscaler researchers discovered that 77 malicious Android apps, with a combined total of over 19 million installs, were distributing various malware families in the official Google Play store. "We identified...

Happy birthday Windows 95: the system that changed PCs forever!
Redazione RHC - August 25th, 2025
August 24, 2025, marked the 30th anniversary of the launch of Windows 95, Microsoft's first mass-market 32-bit consumer operating system, which significantly revolutionized the world of personal computing. In the...

Stagershell: When malware leaves no trace. Malware Forge analysis.
Sandro Sana - August 25th, 2025
In early 2025, an Italian organization found itself the victim of a sneaky intrusion. No dramatic exploit, no textbook attack. What opened the door to the attackers was a VPN...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

