Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...
RIP Microsoft PowerShell 2.0! The end of an era is coming between August and September
SQLite, Nginx, and Apache collapse in a day. Will hackers and AI agents revolutionize bug hunting?
The KING of passwords is getting a makeover! Hashcat 7.0.0 is here: refactoring is out!
The world’s first robotic womb arrives: will an android give birth to babies by 2026?
Microsoft Teams Under Increasingly Under Fire. EncryptHub Compromised Corporate Networks with Malware
A critical vulnerability has been discovered in Microsoft Web Deploy

RIP Microsoft PowerShell 2.0! The end of an era is coming between August and September
Redazione RHC - August 17th, 2025
Microsoft will remove PowerShell 2.0 from Windows starting in August, years after announcing its deprecation and keeping it as an optional feature. The 14-year-old command processor introduced with Windows 7...

SQLite, Nginx, and Apache collapse in a day. Will hackers and AI agents revolutionize bug hunting?
Redazione RHC - August 16th, 2025
Developing AI agents capable of identifying vulnerabilities in complex systems is still a challenging task that requires a lot of manual labor. However, these agents offer a major advantage: unlike...

The KING of passwords is getting a makeover! Hashcat 7.0.0 is here: refactoring is out!
Redazione RHC - August 16th, 2025
The Hashcat team has released a major update to its password guessing tool, version 7.0.0. This is the first major release in over two years and includes hundreds of fixes,...

The world’s first robotic womb arrives: will an android give birth to babies by 2026?
Redazione RHC - August 16th, 2025
Chinese company Kaiwa Technology, based in Guangzhou, has announced its intention to create the world's first "robotic womb" by 2026: a humanoid machine with an artificial womb in its abdomen...

Microsoft Teams Under Increasingly Under Fire. EncryptHub Compromised Corporate Networks with Malware
Redazione RHC - August 16th, 2025
In recent years, Microsoft Teams has become one of the most popular collaboration tools within companies, transforming into a strategic channel not only for communication but also for managing documents,...

A critical vulnerability has been discovered in Microsoft Web Deploy
Redazione RHC - August 16th, 2025
A Microsoft Web Deploy tool has a critical security flaw that could be exploited by authenticated attackers to execute code on affected systems. This is the bug tracked under CVE-2025-53772,...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

