Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Banner Ancharia Mobile 1
LECS 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Tor Boosts Security with Counter Galois Onion CGO Encryption
Di Redazione RHC - 27/11/2025

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

Immagine del sito
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Di Redazione RHC - 26/11/2025

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Immagine del sito
Investment Scam Alert: How to Avoid Losing Thousands
Di Redazione RHC - 26/11/2025

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

Immagine del sito
Malware Uses Finger Command to Infect Windows Devices
Di Redazione RHC - 26/11/2025

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

Immagine del sito
The AGI Revolution: How Mark Gubrud’s Term Changed Tech Forever
Di Redazione RHC - 25/11/2025

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...

“Vibe Coding” for Malware! A Malicious AI-Created Package Appears on NPM

Researchers have identified a new threat in the npm ecosystem: a malicious AI-generated package called @kodane/patch-manager, designed to steal crypto...
Redazione RHC - 03/08/2025 - 11:31

What are Rootkits? Discovering one of the most insidious threats

Rootkits are one of the most insidious and complex cyber threats in the digital security landscape. The term "rootkit" comes from the combination of t...
Sandro Sana - 03/08/2025 - 11:16

Industroyer: The Malware That Shut Down Kiev and Threatens Global Power Grids

The Industroyer malware, also known as Crashoverride, was a framework developed by Russian hackers, deployed in 2016 against Ukraine's power grid. The...
Massimiliano Brolli - 03/08/2025 - 11:14

Stuxnet: The Malware That Introduced Cyberwarfare to the World

Stuxnet is widely recognized as the malware par excellence, the one that introduced cyber warfare to the world, where pages and pages have been writte...
Massimiliano Brolli - 03/08/2025 - 11:02

WannaCry: The Ransomware That Changed the World of Cybersecurity

May 12, 2017, was a special day. For many, it will mean nothing, but others will remember it well, because it was a hectic and eventful day as the ...
Massimiliano Brolli - 03/08/2025 - 11:00

What is spyware: how it works and how it affects. The complete guide.

Spyware is malware (malicious programs) designed to infiltrate users' computer systems to monitor their activities and collect personal information. ...
Redazione RHC - 03/08/2025 - 10:57

“Vibe Coding” for Malware! A Malicious AI-Created Package Appears on NPM

- August 2nd, 2025

Researchers have identified a new threat in the npm ecosystem: a malicious AI-generated package called @kodane/patch-manager, designed to steal cryptocurrency. Presented as a library for "advanced license control and registry...

Facebook Linkedin X

What are Rootkits? Discovering one of the most insidious threats

- August 2nd, 2025

Rootkits are one of the most insidious and complex cyber threats in the digital security landscape. The term "rootkit" comes from the combination of two words: "root," which in Unix...

Facebook Linkedin X

Industroyer: The Malware That Shut Down Kiev and Threatens Global Power Grids

- August 2nd, 2025

The Industroyer malware, also known as Crashoverride, was a framework developed by Russian hackers, deployed in 2016 against Ukraine's power grid. The attack left Kiev without power for an hour....

Facebook Linkedin X

Stuxnet: The Malware That Introduced Cyberwarfare to the World

- August 2nd, 2025

Stuxnet is widely recognized as the malware par excellence, the one that introduced cyber warfare to the world, where pages and pages have been written and will continue to be...

Facebook Linkedin X

WannaCry: The Ransomware That Changed the World of Cybersecurity

- August 2nd, 2025

May 12, 2017, was a special day. For many, it will mean nothing, but others will remember it well, because it was a hectic and eventful day as the world...

Facebook Linkedin X

What is spyware: how it works and how it affects. The complete guide.

- August 2nd, 2025

Spyware is malware (malicious programs) designed to infiltrate users' computer systems to monitor their activities and collect personal information. These programs can be installed on devices without the user's consent...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE