Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...
After Darcula comes Magic Mouse: the new phishing nightmare steals 650,000 cards a month.
Fortinet VPN Under Attack: New Wave of Brute-Force Attacks Detected by GrayNoise
Whonix 17.4 is out! Only a 0day exploit can threaten your anonymity.
Backdoor in xz Utils: 35 Docker Hub images still infected
Huawei introduces algorithm that reduces dependence on foreign chips
Did you meet a girl online? Four Ghanaians might have hit on you.

After Darcula comes Magic Mouse: the new phishing nightmare steals 650,000 cards a month.
Redazione RHC - August 13th, 2025
After the closure of the Darcula phishing platform and the Magic Cat software used by scammers, the Magic Mouse solution has gained popularity among criminals. According to Mnemonic specialists, Magic...

Fortinet VPN Under Attack: New Wave of Brute-Force Attacks Detected by GrayNoise
Redazione RHC - August 13th, 2025
GreyNoise detected two major waves of attacks on Fortinet devices in early August 2025. The first, a brute-force attack targeting Fortinet's SSL VPN on August 3, was followed by an...

Whonix 17.4 is out! Only a 0day exploit can threaten your anonymity.
Redazione RHC - August 13th, 2025
Version 17.4 of the Whonix distribution, designed to ensure greater anonymity online, has been released. The system is based on Debian GNU/Linux and transmits all traffic via Tor. The source...

Backdoor in xz Utils: 35 Docker Hub images still infected
Redazione RHC - August 13th, 2025
Analysts at Binarly have found at least 35 images on Docker Hub still infected with a backdoor that penetrated xz Utils last year. Researchers warned that this could potentially put...

Huawei introduces algorithm that reduces dependence on foreign chips
Redazione RHC - August 13th, 2025
Huawei has unveiled a new software tool that speeds up large AI models by distributing data more efficiently across different types of memory. This could help China reduce its dependence...

Did you meet a girl online? Four Ghanaians might have hit on you.
Redazione RHC - August 13th, 2025
The U.S. Department of Justice has indicted four Ghanaian nationals for their involvement in a massive international fraud ring that stole over $100 million through romance scams and attacks that...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

