Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
320×100
Crowdstriker 970×120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Tor Boosts Security with Counter Galois Onion CGO Encryption
Di Redazione RHC - 27/11/2025

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

Immagine del sito
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Di Redazione RHC - 26/11/2025

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Immagine del sito
Investment Scam Alert: How to Avoid Losing Thousands
Di Redazione RHC - 26/11/2025

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

Immagine del sito
Malware Uses Finger Command to Infect Windows Devices
Di Redazione RHC - 26/11/2025

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

Immagine del sito
The AGI Revolution: How Mark Gubrud’s Term Changed Tech Forever
Di Redazione RHC - 25/11/2025

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...

Fortinet Discovers a New Obfuscated Web Shell. Analysis of UpdateChecker.aspx

The FortiGuard Labs team has published a detailed analysis of a heavily obfuscated web shell used to attack critical infrastructure in the Middle East...
Redazione RHC - 08/08/2025 - 07:24

You’ve been paying for months for a VPN that has done nothing but spy on you

The complex infrastructure of the fraudulent ad network VexTrio Viper has returned to the spotlight after researchers at Infoblox revealed details of ...
Redazione RHC - 07/08/2025 - 21:52

Discovering Access Brokers. What are Initial Access Brokers (IaBs) and what do they sell in the underground market?

We've often talked about how ransomware attacks work and how the ransomware as a service (RaaS) pyramid works, which assigns a role to each team of cr...
Redazione RHC - 07/08/2025 - 15:02

What are ransomware gang data leak sites?

Ransomware gang data leak sites (DLSs) pose an increasingly widespread threat to businesses and individuals using the internet. These sites were creat...
Redazione RHC - 07/08/2025 - 14:59

Discovering the Deep Web and Dark Web: The Ultimate Guide

There has been a lot of talk for some years now about the deep web and the dark web, and many have wondered: but what exactly does this mean? The...
Antonio Piovesan - 07/08/2025 - 14:57

Artificial intelligence will overwhelm us! The warning from a former Google executive is a dystopian future.

A former Google executive is sounding the alarm: artificial intelligence is poised to displace workers and drag us toward a dystopia. Mo Gawdat, a for...
Redazione RHC - 07/08/2025 - 14:35

Fortinet Discovers a New Obfuscated Web Shell. Analysis of UpdateChecker.aspx

- August 7th, 2025

The FortiGuard Labs team has published a detailed analysis of a heavily obfuscated web shell used to attack critical infrastructure in the Middle East. The research focuses on the UpdateChecker.aspx...

Facebook Linkedin X

You’ve been paying for months for a VPN that has done nothing but spy on you

- August 6th, 2025

The complex infrastructure of the fraudulent ad network VexTrio Viper has returned to the spotlight after researchers at Infoblox revealed details of a massive fake mobile app scheme. Under the...

Facebook Linkedin X

Discovering Access Brokers. What are Initial Access Brokers (IaBs) and what do they sell in the underground market?

- August 6th, 2025

We've often talked about how ransomware attacks work and how the ransomware as a service (RaaS) pyramid works, which assigns a role to each team of criminal hackers, as seen...

Facebook Linkedin X

What are ransomware gang data leak sites?

- August 6th, 2025

Ransomware gang data leak sites (DLSs) pose an increasingly widespread threat to businesses and individuals using the internet. These sites were created by cyber gangs to publish data stolen during...

Facebook Linkedin X

Discovering the Deep Web and Dark Web: The Ultimate Guide

- August 6th, 2025

There has been a lot of talk for some years now about the deep web and the dark web, and many have wondered: but what exactly does this mean? The...

Facebook Linkedin X

Artificial intelligence will overwhelm us! The warning from a former Google executive is a dystopian future.

- August 6th, 2025

A former Google executive is sounding the alarm: artificial intelligence is poised to displace workers and drag us toward a dystopia. Mo Gawdat, a former Google executive, is sounding the...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE