Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...
Do you click on text message links? Here are 4.2 million reasons not to.
Criminal Hackers Exploit Cisco Safe Links for Phishing Attacks
Ghost-tapping: How Asian scammers launder money with stolen credit cards
Electronic Warfare. China develops a lamp that blocks enemy radar for miles.
Critical Score 10 Vulnerability in Erlang/Open Telecom Platform: Active Exploits on the Rise
Can’t find your Tesla? No problem: there’s Free TeslaMate.

Do you click on text message links? Here are 4.2 million reasons not to.
Redazione RHC - August 18th, 2025
Proofpoint has released the second volume of its annual study "Human Factor 2025", focusing on phishing and URL-based attacks. Analysis of data from May 2024 to May 2025 shows that...

Criminal Hackers Exploit Cisco Safe Links for Phishing Attacks
Redazione RHC - August 18th, 2025
A complex attack operation was recently discovered, in which cyber attackers used Cisco's security infrastructure to perform online deception maneuvers. Attackers are targeting Cisco Safe Links technology, designed to protect...

Ghost-tapping: How Asian scammers launder money with stolen credit cards
Redazione RHC - August 18th, 2025
Scammers in Southeast Asia have found a new way to launder money using stolen credit cards. Researchers have reported a system they call "ghost-tapping," in which stolen card data is...

Electronic Warfare. China develops a lamp that blocks enemy radar for miles.
Redazione RHC - August 18th, 2025
Chinese engineers have announced the development of a miniature traveling-wave tube (TWT) that could revolutionize the capabilities of modern electronic warfare systems and radar. This special type of vacuum tube...

Critical Score 10 Vulnerability in Erlang/Open Telecom Platform: Active Exploits on the Rise
Redazione RHC - August 18th, 2025
Researchers recorded that a critical flaw in the Erlang/Open Telecom Platform SSH stack implementation began being actively exploited as early as early May 2025; approximately 70% of detections occurred on...

Can’t find your Tesla? No problem: there’s Free TeslaMate.
Redazione RHC - August 17th, 2025
A cybersecurity researcher has discovered that hundreds of TeslaMate servers around the world are openly transmitting Tesla vehicle data without any protection. This means that car telemetry—from precise coordinates and...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

