Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Enterprise BusinessLog 320x200 1
Enterprise BusinessLog 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Tor Boosts Security with Counter Galois Onion CGO Encryption
Di Redazione RHC - 27/11/2025

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

Immagine del sito
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Di Redazione RHC - 26/11/2025

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Immagine del sito
Investment Scam Alert: How to Avoid Losing Thousands
Di Redazione RHC - 26/11/2025

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

Immagine del sito
Malware Uses Finger Command to Infect Windows Devices
Di Redazione RHC - 26/11/2025

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

Immagine del sito
The AGI Revolution: How Mark Gubrud’s Term Changed Tech Forever
Di Redazione RHC - 25/11/2025

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...

Apple Develops Its Own Artificial Intelligence Engine to Power Siri

Apple is developing its own AI engine for answering questions, similar to ChatGPT, according to Bloomberg. The project is managed by a new internal te...
Redazione RHC - 05/08/2025 - 07:43

Proxy Trickster: The Amateur Hackers Group That Wants to Own Servers Worldwide

Specialists at Solar 4RAYS of Solar Group have discovered a new hacker group, Proxy Trickster, dedicated to cryptocurrency mining and proxyjacking (in...
Redazione RHC - 05/08/2025 - 07:16

Malware disguises itself as an innocent photo on Dropbox. APT37’s steganographic strategy

Specialists at the Genians Security Center have discovered an improved version of the RoKRAT malware, associated with the North Korean APT37 group. Th...
Redazione RHC - 04/08/2025 - 20:09

BitLocker Under Attack! A New Technique Enables Lateral Movement While Eluding Security Controls

Through BitLocker's Component Object Model (COM) feature, attackers can deploy an innovative pivoting technique to execute malicious code on targeted ...
Redazione RHC - 04/08/2025 - 15:24

Mozilla warns Firefox extension developers of active phishing campaign

Mozilla has warned Firefox extension developers of a new phishing campaign aimed at compromising their accounts on the official AMO platform (addons.m...
Redazione RHC - 04/08/2025 - 15:02

Is Open Source Going Away? KubeSphere Discontinues Distribution, Ensuing Storm

Unfortunately, times are changing: what was once a temple of collaboration and cooperation is gradually transforming into an ecosystem increasingly or...
Redazione RHC - 04/08/2025 - 11:53

Apple Develops Its Own Artificial Intelligence Engine to Power Siri

- August 4th, 2025

Apple is developing its own AI engine for answering questions, similar to ChatGPT, according to Bloomberg. The project is managed by a new internal team called Answers, Knowledge and Information...

Facebook Linkedin X

Proxy Trickster: The Amateur Hackers Group That Wants to Own Servers Worldwide

- August 4th, 2025

Specialists at Solar 4RAYS of Solar Group have discovered a new hacker group, Proxy Trickster, dedicated to cryptocurrency mining and proxyjacking (interception of server control for conversion and sale). Over...

Facebook Linkedin X

Malware disguises itself as an innocent photo on Dropbox. APT37’s steganographic strategy

- August 3rd, 2025

Specialists at the Genians Security Center have discovered an improved version of the RoKRAT malware, associated with the North Korean APT37 group. The new version is distinguished by an unusual...

Facebook Linkedin X

BitLocker Under Attack! A New Technique Enables Lateral Movement While Eluding Security Controls

- August 3rd, 2025

Through BitLocker's Component Object Model (COM) feature, attackers can deploy an innovative pivoting technique to execute malicious code on targeted systems. This approach, demonstrated via a test tool called BitLockMove,...

Facebook Linkedin X

Mozilla warns Firefox extension developers of active phishing campaign

- August 3rd, 2025

Mozilla has warned Firefox extension developers of a new phishing campaign aimed at compromising their accounts on the official AMO platform (addons.mozilla.org). This ecosystem includes over 60,000 add-ons and more...

Facebook Linkedin X

Is Open Source Going Away? KubeSphere Discontinues Distribution, Ensuing Storm

- August 3rd, 2025

Unfortunately, times are changing: what was once a temple of collaboration and cooperation is gradually transforming into an ecosystem increasingly oriented towards monetization. Another project, specifically KubeSphere, has suddenly stopped...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE