Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
TM RedHotCyber 320x100 042514
Banner Ancharia Desktop 1 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Tor Boosts Security with Counter Galois Onion CGO Encryption
Di Redazione RHC - 27/11/2025

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

Immagine del sito
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Di Redazione RHC - 26/11/2025

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Immagine del sito
Investment Scam Alert: How to Avoid Losing Thousands
Di Redazione RHC - 26/11/2025

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

Immagine del sito
Malware Uses Finger Command to Infect Windows Devices
Di Redazione RHC - 26/11/2025

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

Immagine del sito
The AGI Revolution: How Mark Gubrud’s Term Changed Tech Forever
Di Redazione RHC - 25/11/2025

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...

New 7-Zip flaw: Symbolic links turn extraction into a hack

A recently discovered security flaw in the popular file compression software 7-Zip has raised considerable concern within the security community. All ...
Redazione RHC - 11/08/2025 - 16:00

A 60-year-old man was hospitalized for three weeks following ChatGPT’s medical advice.

Blindly relying on ChatGPT for fitness advice or meal plans can be risky. Even health recommendations provided by artificial intelligence can be life-...
Redazione RHC - 11/08/2025 - 10:34

New 7-Zip flaw: Symbolic links turn extraction into a hack

A recently discovered security flaw in the popular file compression software 7-Zip has raised considerable concern within the security community. All ...
Redazione RHC - 11/08/2025 - 09:25

BadUSB. Webcam Spyware: The Lenovo Bug Threatening Millions of PCs

Researchers at Eclypsium have identified dangerous vulnerabilities in the Lenovo 510 FHD and Lenovo Performance FHD webcams that can be transformed in...
Redazione RHC - 11/08/2025 - 09:19

Win-DoS Epidemic: New DoS and DDoS Attacks Start with Microsoft Windows

During the security conference DEF CON33, a team of industry specialists, Yair and Shahak Morag, from SafeBreach Labs, presented a novel category of d...
Redazione RHC - 11/08/2025 - 09:05

ElectroSim: The Ethical Hackers’ Virtual Environment for Studying OT/ICS Security Flaws

ElectroSim Industrialis an educational virtual machine that simulates the operating platform of a typical electric utility, combining consumption cont...
Redazione RHC - 11/08/2025 - 08:51

New 7-Zip flaw: Symbolic links turn extraction into a hack

- August 10th, 2025

A recently discovered security flaw in the popular file compression software 7-Zip has raised considerable concern within the security community. All versions of 7-Zip prior to 25.01 are affected by...

Facebook Linkedin X

A 60-year-old man was hospitalized for three weeks following ChatGPT’s medical advice.

- August 10th, 2025

Blindly relying on ChatGPT for fitness advice or meal plans can be risky. Even health recommendations provided by artificial intelligence can be life-threatening. A recent case demonstrates this: a 60-year-old...

Facebook Linkedin X

New 7-Zip flaw: Symbolic links turn extraction into a hack

- August 10th, 2025

A recently discovered security flaw in the popular file compression software 7-Zip has raised considerable concern within the security community. All versions of 7-Zip prior to 25.01 are affected by...

Facebook Linkedin X

BadUSB. Webcam Spyware: The Lenovo Bug Threatening Millions of PCs

- August 10th, 2025

Researchers at Eclypsium have identified dangerous vulnerabilities in the Lenovo 510 FHD and Lenovo Performance FHD webcams that can be transformed into BadUSB attack devices. The issue, dubbed BadCam, was...

Facebook Linkedin X

Win-DoS Epidemic: New DoS and DDoS Attacks Start with Microsoft Windows

- August 10th, 2025

During the security conference DEF CON33, a team of industry specialists, Yair and Shahak Morag, from SafeBreach Labs, presented a novel category of denial-of-service (DoS) attacks they've dubbed the "Win-DoS...

Facebook Linkedin X

ElectroSim: The Ethical Hackers’ Virtual Environment for Studying OT/ICS Security Flaws

- August 10th, 2025

ElectroSim Industrialis an educational virtual machine that simulates the operating platform of a typical electric utility, combining consumption control, industrial monitoring, and essential cybersecurity concepts. The environment is designed for...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE