Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Fortinet 320x100px
Enterprise BusinessLog 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Di Redazione RHC - 26/11/2025

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Immagine del sito
Investment Scam Alert: How to Avoid Losing Thousands
Di Redazione RHC - 26/11/2025

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

Immagine del sito
Malware Uses Finger Command to Infect Windows Devices
Di Redazione RHC - 26/11/2025

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

Immagine del sito
The AGI Revolution: How Mark Gubrud’s Term Changed Tech Forever
Di Redazione RHC - 25/11/2025

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...

Immagine del sito
Anthropic Releases Claude Opus 4.5: AI Model for Enhanced Productivity
Di Redazione RHC - 24/11/2025

Anthropic has released Claude Opus 4.5 , its new flagship model, which the company says is the most powerful version yet and ranks at the top of the class for practical programming, agent-based produc...

IndonesianFoods: The Worm That’s Wreaking Havoc on npm and Created 100,000 Packages

A self-propagating worm, named IndonesianFoods , has been discovered in npm . It generates new packets every seven seconds. According to Sonatype, the...
Redazione RHC - 15/11/2025 - 08:43

Vibe-Hacking: The New Frontier of Criminal Cybersecurity

The cybersecurity landscape has accustomed us to constant upheavals. Every year new threats, new scenarios, and new criminal tactics emerge. But today...
Andrea Fellegara - 15/11/2025 - 08:27

Two-Factor Authentication and MFA: Protect Your Accounts in 3 Easy Steps!

Two-factor authentication (2FA) , or more commonly, Multi-Factor Authentication (MFA) , is an effective solution for protecting our online accounts. W...
Redazione RHC - 14/11/2025 - 22:47

John von Neumann: The Multifaceted Genius of 20th-Century Science

We meet the man considered one of the most multifaceted and brilliant scientists of the last century, perhaps equal only to Einstein. He possessed a w...
Carlo Denza - 14/11/2025 - 22:42

The Wayback Machine “of souls” is coming soon. And so are the controversies

Many of us grew up with Hiroshi Shiba, from Jeeg the steel robot who talked to his late father, Professor Senjiro Shiba, a scientist and archaeologist...
Redazione RHC - 14/11/2025 - 18:37

The AI market is in crisis: NVIDIA and other tech giants are declining.

Artificial intelligence has been the biggest trend in recent years, as the stock prices of AI-related tech giants have skyrocketed. NVIDIA has surpass...
Redazione RHC - 14/11/2025 - 15:46
1 15 16 17 18 19 255

IndonesianFoods: The Worm That’s Wreaking Havoc on npm and Created 100,000 Packages

- November 15th, 2025

A self-propagating worm, named IndonesianFoods , has been discovered in npm . It generates new packets every seven seconds. According to Sonatype, the malware has already created over 100,000 packets...

Facebook Linkedin X

Vibe-Hacking: The New Frontier of Criminal Cybersecurity

- November 15th, 2025

The cybersecurity landscape has accustomed us to constant upheavals. Every year new threats, new scenarios, and new criminal tactics emerge. But today, it's not just technology that's redefining the rules...

Facebook Linkedin X

Two-Factor Authentication and MFA: Protect Your Accounts in 3 Easy Steps!

- November 14th, 2025

Two-factor authentication (2FA) , or more commonly, Multi-Factor Authentication (MFA) , is an effective solution for protecting our online accounts. With the rise of cyberattacks and identity theft, it's crucial...

Facebook Linkedin X

John von Neumann: The Multifaceted Genius of 20th-Century Science

- November 14th, 2025

We meet the man considered one of the most multifaceted and brilliant scientists of the last century, perhaps equal only to Einstein. He possessed a wide range of scientific talents,...

Facebook Linkedin X

The Wayback Machine “of souls” is coming soon. And so are the controversies

- November 14th, 2025

Many of us grew up with Hiroshi Shiba, from Jeeg the steel robot who talked to his late father, Professor Senjiro Shiba, a scientist and archaeologist inside a large computer....

Facebook Linkedin X

The AI market is in crisis: NVIDIA and other tech giants are declining.

- November 14th, 2025

Artificial intelligence has been the biggest trend in recent years, as the stock prices of AI-related tech giants have skyrocketed. NVIDIA has surpassed the $5 trillion market cap, becoming a...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE