Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Crowdstrike 320×100
970x120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Tor Boosts Security with Counter Galois Onion CGO Encryption
Di Redazione RHC - 27/11/2025

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

Immagine del sito
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Di Redazione RHC - 26/11/2025

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Immagine del sito
Investment Scam Alert: How to Avoid Losing Thousands
Di Redazione RHC - 26/11/2025

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

Immagine del sito
Malware Uses Finger Command to Infect Windows Devices
Di Redazione RHC - 26/11/2025

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

Immagine del sito
The AGI Revolution: How Mark Gubrud’s Term Changed Tech Forever
Di Redazione RHC - 25/11/2025

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...

Two Android Vulnerabilities Actively Exploited: Google Releases Critical Patches

Google has released the August security updates for Android, which contain patches for six vulnerabilities. Two of these are related to Qualcomm compo...
Redazione RHC - 06/08/2025 - 15:58

Adobe Experience Manager Forms under attack! Urgent patch for a score 10 RCE zero-day bug.

On August 5, 2025, Adobe released an urgent security update for Adobe Experience Manager (AEM) Forms on Java Enterprise Edition (JEE), addressing two ...
Redazione RHC - 06/08/2025 - 15:46

A Year of Silence! Plague Discovered, the Linux Malware No One Had Seen

Researchers at Nextron Systems have discovered a new Linux malware that went undetected for over a year. It allows attackers to gain persistent SSH ac...
Redazione RHC - 06/08/2025 - 15:46

Microsoft launches a $5 million bug hunt! And the war on zero-days begins!

The global cybersecurity industry is gearing up for a new challenge: Microsoft is launching an updated Zero Day Quest initiative, promising previously...
Redazione RHC - 06/08/2025 - 14:38

D-Link cameras under attack! Hackers are still exploiting vulnerabilities from 2020. CISA warns.

Recently, cybercriminals have refocused on old vulnerabilities in popular D-Link Wi-Fi cameras and DVRs. The U.S. Cybersecurity and Infrastructure Sec...
Redazione RHC - 06/08/2025 - 14:04

The Monte Carlo Casino wrote to RHC: “At this stage, no intrusion has been detected.”

Red Hot Cyber has received and is sharing with its readers the official statement from Monte-Carlo Société des Bains de Mer, the famous Monte Carlo ca...
Redazione RHC - 06/08/2025 - 10:04

Two Android Vulnerabilities Actively Exploited: Google Releases Critical Patches

- August 5th, 2025

Google has released the August security updates for Android, which contain patches for six vulnerabilities. Two of these are related to Qualcomm components and have already been exploited in targeted...

Facebook Linkedin X

Adobe Experience Manager Forms under attack! Urgent patch for a score 10 RCE zero-day bug.

- August 5th, 2025

On August 5, 2025, Adobe released an urgent security update for Adobe Experience Manager (AEM) Forms on Java Enterprise Edition (JEE), addressing two serious vulnerabilities: CVE-2025-54253 and CVE-2025-54254. The most...

Facebook Linkedin X

A Year of Silence! Plague Discovered, the Linux Malware No One Had Seen

- August 5th, 2025

Researchers at Nextron Systems have discovered a new Linux malware that went undetected for over a year. It allows attackers to gain persistent SSH access and bypass authentication on compromised...

Facebook Linkedin X

Microsoft launches a $5 million bug hunt! And the war on zero-days begins!

- August 5th, 2025

The global cybersecurity industry is gearing up for a new challenge: Microsoft is launching an updated Zero Day Quest initiative, promising previously fantastic rewards: the total prize pool has reached...

Facebook Linkedin X

D-Link cameras under attack! Hackers are still exploiting vulnerabilities from 2020. CISA warns.

- August 5th, 2025

Recently, cybercriminals have refocused on old vulnerabilities in popular D-Link Wi-Fi cameras and DVRs. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has officially added three dangerous vulnerabilities to its...

Facebook Linkedin X

The Monte Carlo Casino wrote to RHC: “At this stage, no intrusion has been detected.”

- August 5th, 2025

Red Hot Cyber has received and is sharing with its readers the official statement from Monte-Carlo Société des Bains de Mer, the famous Monte Carlo casino, regarding a recent episode...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE