Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Banner Ransomfeed 320x100 1
970x120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Tor Boosts Security with Counter Galois Onion CGO Encryption
Di Redazione RHC - 27/11/2025

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

Immagine del sito
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Di Redazione RHC - 26/11/2025

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Immagine del sito
Investment Scam Alert: How to Avoid Losing Thousands
Di Redazione RHC - 26/11/2025

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

Immagine del sito
Malware Uses Finger Command to Infect Windows Devices
Di Redazione RHC - 26/11/2025

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

Immagine del sito
The AGI Revolution: How Mark Gubrud’s Term Changed Tech Forever
Di Redazione RHC - 25/11/2025

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...

GPT-5 Hacked in 24 Hours. Experts Find Surprising Weaknesses

After Grok-4 was cracked in two days, GPT-5 was defeated in just 24 hours by the same researchers. Almost simultaneously, the SPLX (formerly SplxAI) t...
Redazione RHC - 09/08/2025 - 17:41

Did you double-click WinRAR? Congratulations! You’ve been compromised

A recently closed WinRAR vulnerability tracked under CVE-2025-8088 was exploited in targeted phishing attacks before the patch was released. The issue...
Redazione RHC - 09/08/2025 - 14:49

Satellites Under Hackers’ Control: “It’s Easier to Hack Them Than to Use Satellite Weapons”

At the Black Hat conference in Las Vegas, VisionSpace Technologies demonstrated that it is much easier and cheaper to disable a satellite or alter its...
Redazione RHC - 09/08/2025 - 11:48

A step toward autonomous warfare. A drone can autonomously program its “brain system.”

For the first time, it has been demonstrated that a robot can not only execute commands, but also program its own "brain system" from start to finish....
Redazione RHC - 09/08/2025 - 08:56

GPT-5 is here! The billion-dollar AI that devours GPUs and makes GPT-4 look like a toy.

OpenAI has launched its new flagship model, and the message is clear: reliability, power, and a radical change in the way we interact with artificial ...
Redazione RHC - 09/08/2025 - 08:55

HTTP/1.1 Must Die! Critical vulnerabilities put millions of websites at risk.

A critical security flaw in HTTP/1.1 has been disclosed by security experts, highlighting a threat that has continued to impact web infrastructure for...
Redazione RHC - 08/08/2025 - 17:10

GPT-5 Hacked in 24 Hours. Experts Find Surprising Weaknesses

- August 8th, 2025

After Grok-4 was cracked in two days, GPT-5 was defeated in just 24 hours by the same researchers. Almost simultaneously, the SPLX (formerly SplxAI) testing team declared: "GPT-5 is crude...

Facebook Linkedin X

Did you double-click WinRAR? Congratulations! You’ve been compromised

- August 8th, 2025

A recently closed WinRAR vulnerability tracked under CVE-2025-8088 was exploited in targeted phishing attacks before the patch was released. The issue involved directory traversal and was only fixed in WinRAR...

Facebook Linkedin X

Satellites Under Hackers’ Control: “It’s Easier to Hack Them Than to Use Satellite Weapons”

- August 8th, 2025

At the Black Hat conference in Las Vegas, VisionSpace Technologies demonstrated that it is much easier and cheaper to disable a satellite or alter its trajectory than to use anti-satellite...

Facebook Linkedin X

A step toward autonomous warfare. A drone can autonomously program its “brain system.”

- August 8th, 2025

For the first time, it has been demonstrated that a robot can not only execute commands, but also program its own "brain system" from start to finish. This breakthrough was...

Facebook Linkedin X

GPT-5 is here! The billion-dollar AI that devours GPUs and makes GPT-4 look like a toy.

- August 8th, 2025

OpenAI has launched its new flagship model, and the message is clear: reliability, power, and a radical change in the way we interact with artificial intelligence. After years of viewing...

Facebook Linkedin X

HTTP/1.1 Must Die! Critical vulnerabilities put millions of websites at risk.

- August 7th, 2025

A critical security flaw in HTTP/1.1 has been disclosed by security experts, highlighting a threat that has continued to impact web infrastructure for more than six years, potentially impacting millions...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE