Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
TM RedHotCyber 320x100 042514
Banner Desktop

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Tor Boosts Security with Counter Galois Onion CGO Encryption
Di Redazione RHC - 27/11/2025

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

Immagine del sito
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Di Redazione RHC - 26/11/2025

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Immagine del sito
Investment Scam Alert: How to Avoid Losing Thousands
Di Redazione RHC - 26/11/2025

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

Immagine del sito
Malware Uses Finger Command to Infect Windows Devices
Di Redazione RHC - 26/11/2025

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

Immagine del sito
The AGI Revolution: How Mark Gubrud’s Term Changed Tech Forever
Di Redazione RHC - 25/11/2025

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...

After Darcula comes Magic Mouse: the new phishing nightmare steals 650,000 cards a month.

After the closure of the Darcula phishing platform and the Magic Cat software used by scammers, the Magic Mouse solution has gained popularity among c...
Redazione RHC - 14/08/2025 - 16:49

Fortinet VPN Under Attack: New Wave of Brute-Force Attacks Detected by GrayNoise

GreyNoise detected two major waves of attacks on Fortinet devices in early August 2025. The first, a brute-force attack targeting Fortinet's SSL VPN o...
Redazione RHC - 14/08/2025 - 13:14

Whonix 17.4 is out! Only a 0day exploit can threaten your anonymity.

Version 17.4 of the Whonix distribution, designed to ensure greater anonymity online, has been released. The system is based on Debian GNU/Linux and t...
Redazione RHC - 14/08/2025 - 12:49

Backdoor in xz Utils: 35 Docker Hub images still infected

Analysts at Binarly have found at least 35 images on Docker Hub still infected with a backdoor that penetrated xz Utils last year. Researchers warned ...
Redazione RHC - 14/08/2025 - 09:41

Huawei introduces algorithm that reduces dependence on foreign chips

Huawei has unveiled a new software tool that speeds up large AI models by distributing data more efficiently across different types of memory. This co...
Redazione RHC - 14/08/2025 - 09:17

Did you meet a girl online? Four Ghanaians might have hit on you.

The U.S. Department of Justice has indicted four Ghanaian nationals for their involvement in a massive international fraud ring that stole over $100 m...
Redazione RHC - 14/08/2025 - 07:55

After Darcula comes Magic Mouse: the new phishing nightmare steals 650,000 cards a month.

- August 13th, 2025

After the closure of the Darcula phishing platform and the Magic Cat software used by scammers, the Magic Mouse solution has gained popularity among criminals. According to Mnemonic specialists, Magic...

Facebook Linkedin X

Fortinet VPN Under Attack: New Wave of Brute-Force Attacks Detected by GrayNoise

- August 13th, 2025

GreyNoise detected two major waves of attacks on Fortinet devices in early August 2025. The first, a brute-force attack targeting Fortinet's SSL VPN on August 3, was followed by an...

Facebook Linkedin X

Whonix 17.4 is out! Only a 0day exploit can threaten your anonymity.

- August 13th, 2025

Version 17.4 of the Whonix distribution, designed to ensure greater anonymity online, has been released. The system is based on Debian GNU/Linux and transmits all traffic via Tor. The source...

Facebook Linkedin X

Backdoor in xz Utils: 35 Docker Hub images still infected

- August 13th, 2025

Analysts at Binarly have found at least 35 images on Docker Hub still infected with a backdoor that penetrated xz Utils last year. Researchers warned that this could potentially put...

Facebook Linkedin X

Huawei introduces algorithm that reduces dependence on foreign chips

- August 13th, 2025

Huawei has unveiled a new software tool that speeds up large AI models by distributing data more efficiently across different types of memory. This could help China reduce its dependence...

Facebook Linkedin X

Did you meet a girl online? Four Ghanaians might have hit on you.

- August 13th, 2025

The U.S. Department of Justice has indicted four Ghanaian nationals for their involvement in a massive international fraud ring that stole over $100 million through romance scams and attacks that...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE