Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...
Can a file name compromise a Linux system? Chinese hackers say so
Beware of dissatisfied employees! Four years in prison for bringing his former company to its knees.
When a VPN Becomes a Spy! FreeVPN.One Takes Unauthorized Screenshots
RapperBot DDoS botnet dismantled and alleged developer arrested
The “My Wife” case and the challenges of digital responsibility: privacy, revenge porn, and the role of platforms
Google’s 2025 Performance Review: Fewer Bugs, More Vibe Coding

Can a file name compromise a Linux system? Chinese hackers say so
Redazione RHC - August 23rd, 2025
Researchers at Trellix have discovered an unusual attack pattern on Linux, in which the key element is not an attachment with malicious content, but the name of the file within...

Beware of dissatisfied employees! Four years in prison for bringing his former company to its knees.
Redazione RHC - August 22nd, 2025
A former employee has been convicted of intentionally committing digital sabotage against his employer. Davis Lu, 55, a Chinese citizen living in Houston, was sentenced to four years in prison...

When a VPN Becomes a Spy! FreeVPN.One Takes Unauthorized Screenshots
Redazione RHC - August 22nd, 2025
Koi Security experts warn that the behavior of the popular Chrome extension FreeVPN.One has recently changed. It has begun secretly capturing screenshots of users' activity and transmitting them to a...

RapperBot DDoS botnet dismantled and alleged developer arrested
Redazione RHC - August 22nd, 2025
The U.S. Department of Justice has indicted the alleged developer and administrator of the RapperBot DDoS botnet, which was leased to cybercriminals. The botnet itself was seized by law enforcement...

The “My Wife” case and the challenges of digital responsibility: privacy, revenge porn, and the role of platforms
Paolo Galdieri - August 22nd, 2025
The recent incident involving the Facebook group "My Wife," active since 2019 and boasting over 32,000 members, highlights a dynamic intertwining privacy violations, nonconsensual pornography, systemic misogyny, and serious questions...

Google’s 2025 Performance Review: Fewer Bugs, More Vibe Coding
Redazione RHC - August 22nd, 2025
For Google employees, "staying ahead of the curve" means not just developing AI, but also being able to use it every day. In recent months, the company has seen growing...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

