Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Banner Ransomfeed 320x100 1
2nd Edition GlitchZone RHC 970x120 2

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Tor Boosts Security with Counter Galois Onion CGO Encryption
Di Redazione RHC - 27/11/2025

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

Immagine del sito
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Di Redazione RHC - 26/11/2025

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Immagine del sito
Investment Scam Alert: How to Avoid Losing Thousands
Di Redazione RHC - 26/11/2025

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

Immagine del sito
Malware Uses Finger Command to Infect Windows Devices
Di Redazione RHC - 26/11/2025

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

Immagine del sito
The AGI Revolution: How Mark Gubrud’s Term Changed Tech Forever
Di Redazione RHC - 25/11/2025

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...

Can a file name compromise a Linux system? Chinese hackers say so

Researchers at Trellix have discovered an unusual attack pattern on Linux, in which the key element is not an attachment with malicious content, but t...
Redazione RHC - 24/08/2025 - 08:22

Beware of dissatisfied employees! Four years in prison for bringing his former company to its knees.

A former employee has been convicted of intentionally committing digital sabotage against his employer. Davis Lu, 55, a Chinese citizen living in Hous...
Redazione RHC - 23/08/2025 - 17:01

When a VPN Becomes a Spy! FreeVPN.One Takes Unauthorized Screenshots

Koi Security experts warn that the behavior of the popular Chrome extension FreeVPN.One has recently changed. It has begun secretly capturing screensh...
Redazione RHC - 23/08/2025 - 11:31

RapperBot DDoS botnet dismantled and alleged developer arrested

The U.S. Department of Justice has indicted the alleged developer and administrator of the RapperBot DDoS botnet, which was leased to cybercriminals. ...
Redazione RHC - 23/08/2025 - 09:55

The “My Wife” case and the challenges of digital responsibility: privacy, revenge porn, and the role of platforms

The recent incident involving the Facebook group "My Wife," active since 2019 and boasting over 32,000 members, highlights a dynamic intertwining priv...
Paolo Galdieri - 23/08/2025 - 09:23

Google’s 2025 Performance Review: Fewer Bugs, More Vibe Coding

For Google employees, "staying ahead of the curve" means not just developing AI, but also being able to use it every day. In recent months, the compan...
Redazione RHC - 23/08/2025 - 08:58

Can a file name compromise a Linux system? Chinese hackers say so

- August 23rd, 2025

Researchers at Trellix have discovered an unusual attack pattern on Linux, in which the key element is not an attachment with malicious content, but the name of the file within...

Facebook Linkedin X

Beware of dissatisfied employees! Four years in prison for bringing his former company to its knees.

- August 22nd, 2025

A former employee has been convicted of intentionally committing digital sabotage against his employer. Davis Lu, 55, a Chinese citizen living in Houston, was sentenced to four years in prison...

Facebook Linkedin X

When a VPN Becomes a Spy! FreeVPN.One Takes Unauthorized Screenshots

- August 22nd, 2025

Koi Security experts warn that the behavior of the popular Chrome extension FreeVPN.One has recently changed. It has begun secretly capturing screenshots of users' activity and transmitting them to a...

Facebook Linkedin X

RapperBot DDoS botnet dismantled and alleged developer arrested

- August 22nd, 2025

The U.S. Department of Justice has indicted the alleged developer and administrator of the RapperBot DDoS botnet, which was leased to cybercriminals. The botnet itself was seized by law enforcement...

Facebook Linkedin X

The “My Wife” case and the challenges of digital responsibility: privacy, revenge porn, and the role of platforms

- August 22nd, 2025

The recent incident involving the Facebook group "My Wife," active since 2019 and boasting over 32,000 members, highlights a dynamic intertwining privacy violations, nonconsensual pornography, systemic misogyny, and serious questions...

Facebook Linkedin X

Google’s 2025 Performance Review: Fewer Bugs, More Vibe Coding

- August 22nd, 2025

For Google employees, "staying ahead of the curve" means not just developing AI, but also being able to use it every day. In recent months, the company has seen growing...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE