Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...
Nike Under Fire! IT Infrastructure Access for Sale from an Initial Access Broker
A critical bug in Ollama allows for model replacement attacks
When Criminal Hackers Patch Linux Servers for You! And That’s Not a Good Thing
AI Wants Nuclear Power! Google, Kairos Power, and TVA Team Up for Sustainable Energy
McDonald’s hacked by BobDaHacker! Better him than real cybercriminals
Roblox under fire in Louisiana: A haven for sexual predators

Nike Under Fire! IT Infrastructure Access for Sale from an Initial Access Broker
Redazione RHC - August 19th, 2025
An Initial Access Broker is selling access to Nike USA servers on a popular underground forum. A recent post on a dark web forum has raised new concerns about the...

A critical bug in Ollama allows for model replacement attacks
Redazione RHC - August 19th, 2025
A vulnerability in the popular AI model launcher Ollama opened the door to drive-by attacks, allowing attackers to silently interfere with the local application via a specially crafted website, read...

When Criminal Hackers Patch Linux Servers for You! And That’s Not a Good Thing
Redazione RHC - August 19th, 2025
Red Canary specialists have discovered an unusual campaign using the new DripDropper malware, targeting Linux cloud servers. The attackers gained access via the CVE-2023-46604 vulnerability in Apache ActiveMQ, then gained...

AI Wants Nuclear Power! Google, Kairos Power, and TVA Team Up for Sustainable Energy
Redazione RHC - August 19th, 2025
Google, Kairos Power, and the Tennessee Valley Authority (TVA) have entered into an agreement to supply nuclear power to data centers in the United States. The agreement is part of...

McDonald’s hacked by BobDaHacker! Better him than real cybercriminals
Redazione RHC - August 18th, 2025
Researcher BobDaHacker discovered that McDonald's app rewards point validation was only handled client-side, allowing users to claim free items like nuggets even without enough points. BobDaHacker reported the issue, but...

Roblox under fire in Louisiana: A haven for sexual predators
Redazione RHC - August 18th, 2025
Louisiana Attorney General Liz Murrill has filed a lawsuit against Roblox, accusing the company of allowing its platform to become a haven for sexual predators and distributors of child-themed content....
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

