Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
2nd Edition GlitchZone RHC 320x100 2
TM RedHotCyber 970x120 042543

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Tor Boosts Security with Counter Galois Onion CGO Encryption
Di Redazione RHC - 27/11/2025

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

Immagine del sito
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Di Redazione RHC - 26/11/2025

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Immagine del sito
Investment Scam Alert: How to Avoid Losing Thousands
Di Redazione RHC - 26/11/2025

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

Immagine del sito
Malware Uses Finger Command to Infect Windows Devices
Di Redazione RHC - 26/11/2025

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

Immagine del sito
The AGI Revolution: How Mark Gubrud’s Term Changed Tech Forever
Di Redazione RHC - 25/11/2025

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...

$20 million in zero-day exploits from broker Advanced Security Solutions

Advanced Security Solutions, based in the United Arab Emirates, was founded this month and is offering up to $20 million for zero-day vulnerabilities ...
Redazione RHC - 22/08/2025 - 16:51

Will 2029 be the year of Q-Day? But what if the SHA1 replacement took 12 years?

Security experts are increasingly talking about "Q-Day," the moment when quantum computers will be able to handle modern encryption algorithms. Predic...
Redazione RHC - 22/08/2025 - 11:15

Critical Downgrade Bug in Chat-GPT Leads to Jailbreak of Model

A critical flaw found in OpenAI's latest model, ChatGPT-5, allows attackers to bypass advanced security features through the use of simple expressions...
Redazione RHC - 22/08/2025 - 09:26

China’s Great Firewall blocks internet traffic for 74 minutes

Researchers from the Great Firewall Report team noticed that on the night of August 20, China's Great Firewall experienced a technical issue or was un...
Redazione RHC - 22/08/2025 - 09:01

A Criminal Hacker Sells Access to Roche Underground Servers

A recent post on an underground forum has attracted the attention of cybersecurity experts. A user claimed to have sold administrative access to Roche...
Redazione RHC - 22/08/2025 - 08:12

972 million Google Play VPN users are at risk!

Citizen Lab analysts have reported that more than 20 VPN apps on the Google Play Store have serious security issues that threaten users' privacy and a...
Redazione RHC - 22/08/2025 - 08:02

$20 million in zero-day exploits from broker Advanced Security Solutions

- August 21st, 2025

Advanced Security Solutions, based in the United Arab Emirates, was founded this month and is offering up to $20 million for zero-day vulnerabilities and exploits that would allow anyone to...

Facebook Linkedin X

Will 2029 be the year of Q-Day? But what if the SHA1 replacement took 12 years?

- August 21st, 2025

Security experts are increasingly talking about "Q-Day," the moment when quantum computers will be able to handle modern encryption algorithms. Predictions from major players, from IBM and Google to Gartner...

Facebook Linkedin X

Critical Downgrade Bug in Chat-GPT Leads to Jailbreak of Model

- August 21st, 2025

A critical flaw found in OpenAI's latest model, ChatGPT-5, allows attackers to bypass advanced security features through the use of simple expressions. This bug, dubbed "PROMISQROUTE" by researchers at Adversa...

Facebook Linkedin X

China’s Great Firewall blocks internet traffic for 74 minutes

- August 21st, 2025

Researchers from the Great Firewall Report team noticed that on the night of August 20, China's Great Firewall experienced a technical issue or was undergoing some type of testing. All...

Facebook Linkedin X

A Criminal Hacker Sells Access to Roche Underground Servers

- August 21st, 2025

A recent post on an underground forum has attracted the attention of cybersecurity experts. A user claimed to have sold administrative access to Roche, a pharmaceutical giant with over 100,000...

Facebook Linkedin X

972 million Google Play VPN users are at risk!

- August 21st, 2025

Citizen Lab analysts have reported that more than 20 VPN apps on the Google Play Store have serious security issues that threaten users' privacy and allow the decryption of transmitted...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE