Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...
Windows 11 Insider Preview: New features and improvements ahead
PoC Zero-Click Exploit on iPhone and Mac: How Two Bytes Can Compromise the Apple Ecosystem
Your kidneys for sale on the dark web! The DaVita ransomware attack affects 2.4 million patients
ChatGPT, will it be your new life companion? Humans are saying goodnight to AI
DeepSeek launches version 3.1 of its AI model with support for Chinese chips
Microsoft is investigating an Exchange Online outage affecting the Outlook mobile app

Windows 11 Insider Preview: New features and improvements ahead
Redazione RHC - August 24th, 2025
Microsoft has released a new build 26200.5761 (KB5064093) of Windows 11 Insider Preview to Windows Insiders in the Dev Channel. The update introduces several exciting features and improvements that will...

PoC Zero-Click Exploit on iPhone and Mac: How Two Bytes Can Compromise the Apple Ecosystem
Redazione RHC - August 24th, 2025
An in-depth analysis and proof-of-concept example has been released regarding CVE-2025-43300, a critical security flaw in Apple's image processing infrastructure that allows remote code execution without the need for a...

Your kidneys for sale on the dark web! The DaVita ransomware attack affects 2.4 million patients
Redazione RHC - August 23rd, 2025
DaVita, an American company that operates a network of over 2,600 hemodialysis centers in the United States, reported a serious loss of patient personal data following a ransomware attack. According...

ChatGPT, will it be your new life companion? Humans are saying goodnight to AI
Redazione RHC - August 23rd, 2025
The artificial intelligence revolution is transforming not only work and productivity, but also personal relationships. More and more users report forming real emotional bonds with chatbots, to the point of...

DeepSeek launches version 3.1 of its AI model with support for Chinese chips
Redazione RHC - August 23rd, 2025
There was a day when DeepSeek surprised half the world by demonstrating that much could be done with less. Today it returns with version 3.1 and a message that doesn't...

Microsoft is investigating an Exchange Online outage affecting the Outlook mobile app
Redazione RHC - August 23rd, 2025
A serious issue with the Exchange Online service, flagged as EX1137017, is currently under investigation by Microsoft. Due to this issue, a number of users are unable to send or...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

