Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Banner Mobile
Banner Ancharia Desktop 1 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Tor Boosts Security with Counter Galois Onion CGO Encryption
Di Redazione RHC - 27/11/2025

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

Immagine del sito
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Di Redazione RHC - 26/11/2025

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Immagine del sito
Investment Scam Alert: How to Avoid Losing Thousands
Di Redazione RHC - 26/11/2025

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

Immagine del sito
Malware Uses Finger Command to Infect Windows Devices
Di Redazione RHC - 26/11/2025

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

Immagine del sito
The AGI Revolution: How Mark Gubrud’s Term Changed Tech Forever
Di Redazione RHC - 25/11/2025

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...

Nike Under Fire! IT Infrastructure Access for Sale from an Initial Access Broker

An Initial Access Broker is selling access to Nike USA servers on a popular underground forum. A recent post on a dark web forum has raised new con...
Redazione RHC - 20/08/2025 - 19:31

A critical bug in Ollama allows for model replacement attacks

A vulnerability in the popular AI model launcher Ollama opened the door to drive-by attacks, allowing attackers to silently interfere with the local a...
Redazione RHC - 20/08/2025 - 17:55

When Criminal Hackers Patch Linux Servers for You! And That’s Not a Good Thing

Red Canary specialists have discovered an unusual campaign using the new DripDropper malware, targeting Linux cloud servers. The attackers gained acce...
Redazione RHC - 20/08/2025 - 10:41

AI Wants Nuclear Power! Google, Kairos Power, and TVA Team Up for Sustainable Energy

Google, Kairos Power, and the Tennessee Valley Authority (TVA) have entered into an agreement to supply nuclear power to data centers in the United St...
Redazione RHC - 20/08/2025 - 08:59

McDonald’s hacked by BobDaHacker! Better him than real cybercriminals

Researcher BobDaHacker discovered that McDonald's app rewards point validation was only handled client-side, allowing users to claim free items like n...
Redazione RHC - 19/08/2025 - 22:26

Roblox under fire in Louisiana: A haven for sexual predators

Louisiana Attorney General Liz Murrill has filed a lawsuit against Roblox, accusing the company of allowing its platform to become a haven for sexual ...
Redazione RHC - 19/08/2025 - 22:03

Nike Under Fire! IT Infrastructure Access for Sale from an Initial Access Broker

- August 19th, 2025

An Initial Access Broker is selling access to Nike USA servers on a popular underground forum. A recent post on a dark web forum has raised new concerns about the...

Facebook Linkedin X

A critical bug in Ollama allows for model replacement attacks

- August 19th, 2025

A vulnerability in the popular AI model launcher Ollama opened the door to drive-by attacks, allowing attackers to silently interfere with the local application via a specially crafted website, read...

Facebook Linkedin X

When Criminal Hackers Patch Linux Servers for You! And That’s Not a Good Thing

- August 19th, 2025

Red Canary specialists have discovered an unusual campaign using the new DripDropper malware, targeting Linux cloud servers. The attackers gained access via the CVE-2023-46604 vulnerability in Apache ActiveMQ, then gained...

Facebook Linkedin X

AI Wants Nuclear Power! Google, Kairos Power, and TVA Team Up for Sustainable Energy

- August 19th, 2025

Google, Kairos Power, and the Tennessee Valley Authority (TVA) have entered into an agreement to supply nuclear power to data centers in the United States. The agreement is part of...

Facebook Linkedin X

McDonald’s hacked by BobDaHacker! Better him than real cybercriminals

- August 18th, 2025

Researcher BobDaHacker discovered that McDonald's app rewards point validation was only handled client-side, allowing users to claim free items like nuggets even without enough points. BobDaHacker reported the issue, but...

Facebook Linkedin X

Roblox under fire in Louisiana: A haven for sexual predators

- August 18th, 2025

Louisiana Attorney General Liz Murrill has filed a lawsuit against Roblox, accusing the company of allowing its platform to become a haven for sexual predators and distributors of child-themed content....

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE