Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
TM RedHotCyber 320x100 042514
UtiliaCS 970x120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Tor Boosts Security with Counter Galois Onion CGO Encryption
Di Redazione RHC - 27/11/2025

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

Immagine del sito
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Di Redazione RHC - 26/11/2025

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Immagine del sito
Investment Scam Alert: How to Avoid Losing Thousands
Di Redazione RHC - 26/11/2025

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

Immagine del sito
Malware Uses Finger Command to Infect Windows Devices
Di Redazione RHC - 26/11/2025

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

Immagine del sito
The AGI Revolution: How Mark Gubrud’s Term Changed Tech Forever
Di Redazione RHC - 25/11/2025

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...

Proton leaves Switzerland for Europe! €100 million for Lumo artificial intelligence

Technology company Proton, which already has 100 million users worldwide, found itself at the center of two major news stories. First, the launch of i...
Redazione RHC - 18/08/2025 - 17:28

After XSS’s shutdown, Rehubcom arrives. The Dark Web continues.

A former moderator of the XSS dark web forum, known as Rehub, has launched his own platform called Rehubcom. The move coincides with the arrest of XSS...
Redazione RHC - 18/08/2025 - 16:02

Tesla’s Dojo project is dead. A technological gamble ended in resounding failure.

On July 23, 2025, Tesla held its second-quarter earnings conference call. Elon Musk, as usual, conveyed his infectious optimism to Wall Street. Speaki...
Redazione RHC - 18/08/2025 - 10:26

OT Under Fire! CISA Releases Critical Asset Inventory Guide

CISA, in collaboration with international partners, has published a comprehensive guide, titled "OT Cybersecurity Fundamentals: Asset Inventory Guide ...
Redazione RHC - 18/08/2025 - 09:04

The MadeYouReset vulnerability in HTTP/2 can be exploited in powerful DDoS attacks

A vulnerability called MadeYouReset has been discovered in several HTTP/2 implementations. This vulnerability can be exploited to launch powerful DDoS...
Redazione RHC - 18/08/2025 - 08:53

Microsoft: $250 million in salaries for AI talent

According to inside sources and internal documents seen by Business Insider, the software giant has compiled a list of its most sought-after engineers...
Redazione RHC - 18/08/2025 - 08:41

Proton leaves Switzerland for Europe! €100 million for Lumo artificial intelligence

- August 17th, 2025

Technology company Proton, which already has 100 million users worldwide, found itself at the center of two major news stories. First, the launch of its generative artificial intelligence, Lumo, which...

Facebook Linkedin X

After XSS’s shutdown, Rehubcom arrives. The Dark Web continues.

- August 17th, 2025

A former moderator of the XSS dark web forum, known as Rehub, has launched his own platform called Rehubcom. The move coincides with the arrest of XSS's administrator in Kiev...

Facebook Linkedin X

Tesla’s Dojo project is dead. A technological gamble ended in resounding failure.

- August 17th, 2025

On July 23, 2025, Tesla held its second-quarter earnings conference call. Elon Musk, as usual, conveyed his infectious optimism to Wall Street. Speaking about Dojo, the company's carefully constructed artificial...

Facebook Linkedin X

OT Under Fire! CISA Releases Critical Asset Inventory Guide

- August 17th, 2025

CISA, in collaboration with international partners, has published a comprehensive guide, titled "OT Cybersecurity Fundamentals: Asset Inventory Guide for Owners and Operators," to strengthen cybersecurity defenses in critical infrastructure sectors....

Facebook Linkedin X

The MadeYouReset vulnerability in HTTP/2 can be exploited in powerful DDoS attacks

- August 17th, 2025

A vulnerability called MadeYouReset has been discovered in several HTTP/2 implementations. This vulnerability can be exploited to launch powerful DDoS attacks. Researchers at Imperva, Deepness Lab, and Tel Aviv University...

Facebook Linkedin X

Microsoft: $250 million in salaries for AI talent

- August 17th, 2025

According to inside sources and internal documents seen by Business Insider, the software giant has compiled a list of its most sought-after engineers and researchers and is launching a new...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE