Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...
Fortinet Discovers a New Obfuscated Web Shell. Analysis of UpdateChecker.aspx
You’ve been paying for months for a VPN that has done nothing but spy on you
Discovering Access Brokers. What are Initial Access Brokers (IaBs) and what do they sell in the underground market?
What are ransomware gang data leak sites?
Discovering the Deep Web and Dark Web: The Ultimate Guide
Artificial intelligence will overwhelm us! The warning from a former Google executive is a dystopian future.

Fortinet Discovers a New Obfuscated Web Shell. Analysis of UpdateChecker.aspx
Redazione RHC - August 7th, 2025
The FortiGuard Labs team has published a detailed analysis of a heavily obfuscated web shell used to attack critical infrastructure in the Middle East. The research focuses on the UpdateChecker.aspx...

You’ve been paying for months for a VPN that has done nothing but spy on you
Redazione RHC - August 6th, 2025
The complex infrastructure of the fraudulent ad network VexTrio Viper has returned to the spotlight after researchers at Infoblox revealed details of a massive fake mobile app scheme. Under the...

Discovering Access Brokers. What are Initial Access Brokers (IaBs) and what do they sell in the underground market?
Redazione RHC - August 6th, 2025
We've often talked about how ransomware attacks work and how the ransomware as a service (RaaS) pyramid works, which assigns a role to each team of criminal hackers, as seen...

What are ransomware gang data leak sites?
Redazione RHC - August 6th, 2025
Ransomware gang data leak sites (DLSs) pose an increasingly widespread threat to businesses and individuals using the internet. These sites were created by cyber gangs to publish data stolen during...

Discovering the Deep Web and Dark Web: The Ultimate Guide
Antonio Piovesan - August 6th, 2025
There has been a lot of talk for some years now about the deep web and the dark web, and many have wondered: but what exactly does this mean? The...

Artificial intelligence will overwhelm us! The warning from a former Google executive is a dystopian future.
Redazione RHC - August 6th, 2025
A former Google executive is sounding the alarm: artificial intelligence is poised to displace workers and drag us toward a dystopia. Mo Gawdat, a former Google executive, is sounding the...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

