Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...
Apple Develops Its Own Artificial Intelligence Engine to Power Siri
Proxy Trickster: The Amateur Hackers Group That Wants to Own Servers Worldwide
Malware disguises itself as an innocent photo on Dropbox. APT37’s steganographic strategy
BitLocker Under Attack! A New Technique Enables Lateral Movement While Eluding Security Controls
Mozilla warns Firefox extension developers of active phishing campaign
Is Open Source Going Away? KubeSphere Discontinues Distribution, Ensuing Storm

Apple Develops Its Own Artificial Intelligence Engine to Power Siri
Redazione RHC - August 4th, 2025
Apple is developing its own AI engine for answering questions, similar to ChatGPT, according to Bloomberg. The project is managed by a new internal team called Answers, Knowledge and Information...

Proxy Trickster: The Amateur Hackers Group That Wants to Own Servers Worldwide
Redazione RHC - August 4th, 2025
Specialists at Solar 4RAYS of Solar Group have discovered a new hacker group, Proxy Trickster, dedicated to cryptocurrency mining and proxyjacking (interception of server control for conversion and sale). Over...

Malware disguises itself as an innocent photo on Dropbox. APT37’s steganographic strategy
Redazione RHC - August 3rd, 2025
Specialists at the Genians Security Center have discovered an improved version of the RoKRAT malware, associated with the North Korean APT37 group. The new version is distinguished by an unusual...

BitLocker Under Attack! A New Technique Enables Lateral Movement While Eluding Security Controls
Redazione RHC - August 3rd, 2025
Through BitLocker's Component Object Model (COM) feature, attackers can deploy an innovative pivoting technique to execute malicious code on targeted systems. This approach, demonstrated via a test tool called BitLockMove,...

Mozilla warns Firefox extension developers of active phishing campaign
Redazione RHC - August 3rd, 2025
Mozilla has warned Firefox extension developers of a new phishing campaign aimed at compromising their accounts on the official AMO platform (addons.mozilla.org). This ecosystem includes over 60,000 add-ons and more...

Is Open Source Going Away? KubeSphere Discontinues Distribution, Ensuing Storm
Redazione RHC - August 3rd, 2025
Unfortunately, times are changing: what was once a temple of collaboration and cooperation is gradually transforming into an ecosystem increasingly oriented towards monetization. Another project, specifically KubeSphere, has suddenly stopped...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

