Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
320×100
Redhotcyber Banner Sito 970x120px Uscita 101125

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Tor Boosts Security with Counter Galois Onion CGO Encryption
Di Redazione RHC - 27/11/2025

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

Immagine del sito
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Di Redazione RHC - 26/11/2025

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Immagine del sito
Investment Scam Alert: How to Avoid Losing Thousands
Di Redazione RHC - 26/11/2025

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

Immagine del sito
Malware Uses Finger Command to Infect Windows Devices
Di Redazione RHC - 26/11/2025

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

Immagine del sito
The AGI Revolution: How Mark Gubrud’s Term Changed Tech Forever
Di Redazione RHC - 25/11/2025

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...

RDP Under Fire! 30,000 Unique IP Addresses Probe Exposed Services for Targeted Attacks

Security researchers at greyNoise have detected a large, coordinated scanning operation against Microsoft Remote Desktop Protocol (RDP) services, in w...
Redazione RHC - 26/08/2025 - 08:54

No Miracle! The Pontifical Salesian University falls victim to ransomware.

On the night of August 19, the IT infrastructure of the Salesian Pontifical University (UPS) was the victim of a serious cyber attack that rendered t...
Redazione RHC - 26/08/2025 - 08:36

AI Phishing is here! ChatGPT, click here now to avoid losing access!

Phishing attacks are becoming increasingly sophisticated and are now targeting not only users, but also automated AI-based defenses. Researchers have ...
Redazione RHC - 25/08/2025 - 15:40

Why Task Scheduler Has Become Security Teams’ Worst Nightmare

Over the past twelve months, security experts have noticed an increase in attackers using Windows scheduling capabilities, intended for system managem...
Redazione RHC - 25/08/2025 - 15:07

200 car models vulnerable? ‘Killer’ firmware for Flipper Zero surfaces on the darknet.

The topic of hacking and car theft using Flipper Zero has returned to the forefront around the world, and we also talked about it in a recent article....
Redazione RHC - 25/08/2025 - 11:14

“Son, get access to your dad’s smartphone!” Sharp increase in fraud involving minors

F6 has reported a sharp increase in fraud in which criminals exploit minors to access their parents' bank accounts. According to analysts, approximate...
Redazione RHC - 25/08/2025 - 10:01

RDP Under Fire! 30,000 Unique IP Addresses Probe Exposed Services for Targeted Attacks

- August 25th, 2025

Security researchers at greyNoise have detected a large, coordinated scanning operation against Microsoft Remote Desktop Protocol (RDP) services, in which attackers scanned over 30,000 unique IP addresses to assess vulnerabilities...

Facebook Linkedin X

No Miracle! The Pontifical Salesian University falls victim to ransomware.

- August 25th, 2025

On the night of August 19, the IT infrastructure of the Salesian Pontifical University (UPS) was the victim of a serious cyber attack that rendered the University's website and all...

Facebook Linkedin X

AI Phishing is here! ChatGPT, click here now to avoid losing access!

- August 24th, 2025

Phishing attacks are becoming increasingly sophisticated and are now targeting not only users, but also automated AI-based defenses. Researchers have discovered a campaign in which attackers embed hidden instructions in...

Facebook Linkedin X

Why Task Scheduler Has Become Security Teams’ Worst Nightmare

- August 24th, 2025

Over the past twelve months, security experts have noticed an increase in attackers using Windows scheduling capabilities, intended for system management, to establish their presence within compromised systems. Malicious commands...

Facebook Linkedin X

200 car models vulnerable? ‘Killer’ firmware for Flipper Zero surfaces on the darknet.

- August 24th, 2025

The topic of hacking and car theft using Flipper Zero has returned to the forefront around the world, and we also talked about it in a recent article. This time,...

Facebook Linkedin X

“Son, get access to your dad’s smartphone!” Sharp increase in fraud involving minors

- August 24th, 2025

F6 has reported a sharp increase in fraud in which criminals exploit minors to access their parents' bank accounts. According to analysts, approximately 3,500 such cases were recorded in the...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE