Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...
Google fixes critical bug in Gemini that allows tracking of users
It only took one too many! Phishing scam impersonating Booking.com using homoglyphics.
Cobalt Strike for everyone with CrossC2! We’re paying attention to Linux servers without EDR
Bug da Oscar (score 10) per Cisco Secure Firewall Management Center
The Robot Girlfriend is coming! The new frontier of Chinese-made technology.
Critical vulnerability in Apache Tomcat must be patched, otherwise the server could go into DoS.

Google fixes critical bug in Gemini that allows tracking of users
Redazione RHC - August 14th, 2025
Google developers have fixed a bug that allowed malicious Google Calendar invitations to remotely take control of Gemini agents running on the victim's device and steal user data. Gemini is...

It only took one too many! Phishing scam impersonating Booking.com using homoglyphics.
Redazione RHC - August 14th, 2025
Attackers have started using an unusual trick to disguise phishing links, making them appear as Booking.com addresses. The new malware campaign uses the Japanese hiragana character "ん" (U+3093). In some...

Cobalt Strike for everyone with CrossC2! We’re paying attention to Linux servers without EDR
Redazione RHC - August 14th, 2025
Japan has been hit by a new wave of cyberattacks using CrossC2, a tool to extend the functionality of Cobalt Strike to Linux and macOS platforms. The JPCERT/CC Coordination Center...

Bug da Oscar (score 10) per Cisco Secure Firewall Management Center
Redazione RHC - August 14th, 2025
A critical security flaw has been disclosed by Cisco in its Secure Firewall Management Center (FMC) software, potentially allowing unauthenticated attackers to remotely execute shell commands of their choice with...

The Robot Girlfriend is coming! The new frontier of Chinese-made technology.
Redazione RHC - August 14th, 2025
While the rise of robots in China, the world's largest market and producer of robots, is attracting the attention of the global information technology (IT) industry, the emergence of a...

Critical vulnerability in Apache Tomcat must be patched, otherwise the server could go into DoS.
Redazione RHC - August 14th, 2025
A critical security flaw has been discovered in Apache Tomcat's HTTP/2 implementation. This vulnerability allows attackers to conduct malicious denial-of-service (DoS) attacks on web servers. The vulnerability, tracked under CVE-2025-48989...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

