Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Enterprise BusinessLog 320x200 1
Banner Ransomfeed 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Tor Boosts Security with Counter Galois Onion CGO Encryption
Di Redazione RHC - 27/11/2025

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

Immagine del sito
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Di Redazione RHC - 26/11/2025

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Immagine del sito
Investment Scam Alert: How to Avoid Losing Thousands
Di Redazione RHC - 26/11/2025

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

Immagine del sito
Malware Uses Finger Command to Infect Windows Devices
Di Redazione RHC - 26/11/2025

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

Immagine del sito
The AGI Revolution: How Mark Gubrud’s Term Changed Tech Forever
Di Redazione RHC - 25/11/2025

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...

Do you click on text message links? Here are 4.2 million reasons not to.

Proofpoint has released the second volume of its annual study "Human Factor 2025", focusing on phishing and URL-based attacks. Analysis of data from M...
Redazione RHC - 19/08/2025 - 11:57

Criminal Hackers Exploit Cisco Safe Links for Phishing Attacks

A complex attack operation was recently discovered, in which cyber attackers used Cisco's security infrastructure to perform online deception maneuver...
Redazione RHC - 19/08/2025 - 10:52

Ghost-tapping: How Asian scammers launder money with stolen credit cards

Scammers in Southeast Asia have found a new way to launder money using stolen credit cards. Researchers have reported a system they call "ghost-tappin...
Redazione RHC - 19/08/2025 - 08:58

Electronic Warfare. China develops a lamp that blocks enemy radar for miles.

Chinese engineers have announced the development of a miniature traveling-wave tube (TWT) that could revolutionize the capabilities of modern electron...
Redazione RHC - 19/08/2025 - 08:48

Critical Score 10 Vulnerability in Erlang/Open Telecom Platform: Active Exploits on the Rise

Researchers recorded that a critical flaw in the Erlang/Open Telecom Platform SSH stack implementation began being actively exploited as early as earl...
Redazione RHC - 19/08/2025 - 08:46

Can’t find your Tesla? No problem: there’s Free TeslaMate.

A cybersecurity researcher has discovered that hundreds of TeslaMate servers around the world are openly transmitting Tesla vehicle data without any p...
Redazione RHC - 18/08/2025 - 19:57

Do you click on text message links? Here are 4.2 million reasons not to.

- August 18th, 2025

Proofpoint has released the second volume of its annual study "Human Factor 2025", focusing on phishing and URL-based attacks. Analysis of data from May 2024 to May 2025 shows that...

Facebook Linkedin X

Criminal Hackers Exploit Cisco Safe Links for Phishing Attacks

- August 18th, 2025

A complex attack operation was recently discovered, in which cyber attackers used Cisco's security infrastructure to perform online deception maneuvers. Attackers are targeting Cisco Safe Links technology, designed to protect...

Facebook Linkedin X

Ghost-tapping: How Asian scammers launder money with stolen credit cards

- August 18th, 2025

Scammers in Southeast Asia have found a new way to launder money using stolen credit cards. Researchers have reported a system they call "ghost-tapping," in which stolen card data is...

Facebook Linkedin X

Electronic Warfare. China develops a lamp that blocks enemy radar for miles.

- August 18th, 2025

Chinese engineers have announced the development of a miniature traveling-wave tube (TWT) that could revolutionize the capabilities of modern electronic warfare systems and radar. This special type of vacuum tube...

Facebook Linkedin X

Critical Score 10 Vulnerability in Erlang/Open Telecom Platform: Active Exploits on the Rise

- August 18th, 2025

Researchers recorded that a critical flaw in the Erlang/Open Telecom Platform SSH stack implementation began being actively exploited as early as early May 2025; approximately 70% of detections occurred on...

Facebook Linkedin X

Can’t find your Tesla? No problem: there’s Free TeslaMate.

- August 17th, 2025

A cybersecurity researcher has discovered that hundreds of TeslaMate servers around the world are openly transmitting Tesla vehicle data without any protection. This means that car telemetry—from precise coordinates and...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE