Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
320x100 Itcentric
Redhotcyber Banner Sito 970x120px Uscita 101125

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Tor Boosts Security with Counter Galois Onion CGO Encryption
Di Redazione RHC - 27/11/2025

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

Immagine del sito
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Di Redazione RHC - 26/11/2025

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Immagine del sito
Investment Scam Alert: How to Avoid Losing Thousands
Di Redazione RHC - 26/11/2025

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

Immagine del sito
Malware Uses Finger Command to Infect Windows Devices
Di Redazione RHC - 26/11/2025

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

Immagine del sito
The AGI Revolution: How Mark Gubrud’s Term Changed Tech Forever
Di Redazione RHC - 25/11/2025

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...

29,000 Exchange servers at risk. The exploit for CVE-2025-53786 is under exploitation.

29,000 Exchange servers are vulnerable to CVE-2025-53786, which allows attackers to move within Microsoft cloud environments, potentially leading to c...
Redazione RHC - 13/08/2025 - 08:53

Vulnerability in a car dealership’s online login system: Researcher finds security flaws

A vulnerability was discovered in the online dealership login system of one of the world's largest automakers—all it took was a little digging into th...
Redazione RHC - 12/08/2025 - 22:10

Vulnerability in car dealership online login system: Researcher finds security flaws

A vulnerability has been discovered in the online login system for dealerships at one of the world's largest car manufacturers: all it took was a litt...
Redazione RHC - 12/08/2025 - 21:42

As expected, the WinRAR bug has become a devastating weapon for cyber criminals

As expected, the infamous WinRAR bug is now being actively exploited by attackers on a large scale, given the software's widespread use and popularity...
Redazione RHC - 12/08/2025 - 15:44

No Tariffs for 90 Days! China and the US Reach a Temporary Economic Agreement

The Government of the People's Republic of China ("China") and the Government of the United States of America ("USA"), according to a report by Beijin...
Redazione RHC - 12/08/2025 - 11:46

Toward Skynet: Johns Hopkins University Improves War Simulations with Artificial Intelligence

Johns Hopkins University in Maryland is preparing to upgrade its AI-powered wargaming tools to help the Pentagon identify adversaries' weaknesses in r...
Redazione RHC - 12/08/2025 - 11:06

29,000 Exchange servers at risk. The exploit for CVE-2025-53786 is under exploitation.

- August 12th, 2025

29,000 Exchange servers are vulnerable to CVE-2025-53786, which allows attackers to move within Microsoft cloud environments, potentially leading to complete domain compromise. CVE-2025-53786 allows attackers who have already gained administrative...

Facebook Linkedin X

Vulnerability in a car dealership’s online login system: Researcher finds security flaws

- August 11th, 2025

A vulnerability was discovered in the online dealership login system of one of the world's largest automakers—all it took was a little digging into the page's code. Security researcher Eaton...

Facebook Linkedin X

Vulnerability in car dealership online login system: Researcher finds security flaws

- August 11th, 2025

A vulnerability has been discovered in the online login system for dealerships at one of the world's largest car manufacturers: all it took was a little digging into the page's...

Facebook Linkedin X

As expected, the WinRAR bug has become a devastating weapon for cyber criminals

- August 11th, 2025

As expected, the infamous WinRAR bug is now being actively exploited by attackers on a large scale, given the software's widespread use and popularity. ESET experts have reported that the...

Facebook Linkedin X

No Tariffs for 90 Days! China and the US Reach a Temporary Economic Agreement

- August 11th, 2025

The Government of the People's Republic of China ("China") and the Government of the United States of America ("USA"), according to a report by Beijing-based Xinhua news agency on August...

Facebook Linkedin X

Toward Skynet: Johns Hopkins University Improves War Simulations with Artificial Intelligence

- August 11th, 2025

Johns Hopkins University in Maryland is preparing to upgrade its AI-powered wargaming tools to help the Pentagon identify adversaries' weaknesses in real-world conflicts. The work, conducted at the university's Applied...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE