Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Banner Ransomfeed 320x100 1
2nd Edition GlitchZone RHC 970x120 2

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Tor Boosts Security with Counter Galois Onion CGO Encryption
Di Redazione RHC - 27/11/2025

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

Immagine del sito
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Di Redazione RHC - 26/11/2025

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Immagine del sito
Investment Scam Alert: How to Avoid Losing Thousands
Di Redazione RHC - 26/11/2025

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

Immagine del sito
Malware Uses Finger Command to Infect Windows Devices
Di Redazione RHC - 26/11/2025

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

Immagine del sito
The AGI Revolution: How Mark Gubrud’s Term Changed Tech Forever
Di Redazione RHC - 25/11/2025

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...

Charon Ransomware Arrives. It Surpasses EDR, Is Stealth, and Gives a Nod to Top APTs

Trend Micro has detected a targeted attack on the government and aviation sectors in the Middle East using a new ransomware called Charon. The attacke...
Redazione RHC - 13/08/2025 - 14:40

Critical Vulnerability in Fortinet: Update FortiOS, FortiProxy, and FortiPAM Now

Several Fortinet security products, including FortiOS, FortiProxy, and FortiPAM, are affected by a high-severity authentication evasion vulnerability....
Redazione RHC - 13/08/2025 - 11:57

Critical Update for Google Chrome: Patches for Various Vulnerabilities

A critical security update has been released for Google Chrome, which addresses six security vulnerabilities that could be exploited to execute arbitr...
Redazione RHC - 13/08/2025 - 11:01

Heading for a bang for August! 36 RCEs for Microsoft Patch Tuesday August

August Patch Tuesday: Microsoft releases security updates that fix 107 vulnerabilities across its ecosystem products. The update includes fixes for 90...
Redazione RHC - 13/08/2025 - 09:48

Critical RCE vulnerability in Microsoft Teams: Urgent update needed

As part of the August 2025 Patch Tuesday security updates, a critical Remote Code Execution (RCE) vulnerability in Microsoft's Teams collaboration sof...
Redazione RHC - 13/08/2025 - 09:12

29,000 Exchange servers at risk. The exploit for CVE-2025-53786 is under exploitation.

29,000 Exchange servers are vulnerable to CVE-2025-53786, which allows attackers to move within Microsoft cloud environments, potentially leading to c...
Redazione RHC - 13/08/2025 - 08:53

Charon Ransomware Arrives. It Surpasses EDR, Is Stealth, and Gives a Nod to Top APTs

- August 12th, 2025

Trend Micro has detected a targeted attack on the government and aviation sectors in the Middle East using a new ransomware called Charon. The attackers employed a complex infection chain...

Facebook Linkedin X

Critical Vulnerability in Fortinet: Update FortiOS, FortiProxy, and FortiPAM Now

- August 12th, 2025

Several Fortinet security products, including FortiOS, FortiProxy, and FortiPAM, are affected by a high-severity authentication evasion vulnerability. The flaw, tracked as CVE-2024-26009, has a CVSS score of 7.9 and allows...

Facebook Linkedin X

Critical Update for Google Chrome: Patches for Various Vulnerabilities

- August 12th, 2025

A critical security update has been released for Google Chrome, which addresses six security vulnerabilities that could be exploited to execute arbitrary code on affected systems. An emergency security update...

Facebook Linkedin X

Heading for a bang for August! 36 RCEs for Microsoft Patch Tuesday August

- August 12th, 2025

August Patch Tuesday: Microsoft releases security updates that fix 107 vulnerabilities across its ecosystem products. The update includes fixes for 90 vulnerabilities, classified as follows: 13 are critical, 76 are...

Facebook Linkedin X

Critical RCE vulnerability in Microsoft Teams: Urgent update needed

- August 12th, 2025

As part of the August 2025 Patch Tuesday security updates, a critical Remote Code Execution (RCE) vulnerability in Microsoft's Teams collaboration software has been patched. The critical flaw, tracked as...

Facebook Linkedin X

29,000 Exchange servers at risk. The exploit for CVE-2025-53786 is under exploitation.

- August 12th, 2025

29,000 Exchange servers are vulnerable to CVE-2025-53786, which allows attackers to move within Microsoft cloud environments, potentially leading to complete domain compromise. CVE-2025-53786 allows attackers who have already gained administrative...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE