Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...
“Vibe Coding” for Malware! A Malicious AI-Created Package Appears on NPM
What are Rootkits? Discovering one of the most insidious threats
Industroyer: The Malware That Shut Down Kiev and Threatens Global Power Grids
Stuxnet: The Malware That Introduced Cyberwarfare to the World
WannaCry: The Ransomware That Changed the World of Cybersecurity
What is spyware: how it works and how it affects. The complete guide.

“Vibe Coding” for Malware! A Malicious AI-Created Package Appears on NPM
Redazione RHC - August 2nd, 2025
Researchers have identified a new threat in the npm ecosystem: a malicious AI-generated package called @kodane/patch-manager, designed to steal cryptocurrency. Presented as a library for "advanced license control and registry...

What are Rootkits? Discovering one of the most insidious threats
Sandro Sana - August 2nd, 2025
Rootkits are one of the most insidious and complex cyber threats in the digital security landscape. The term "rootkit" comes from the combination of two words: "root," which in Unix...

Industroyer: The Malware That Shut Down Kiev and Threatens Global Power Grids
Massimiliano Brolli - August 2nd, 2025
The Industroyer malware, also known as Crashoverride, was a framework developed by Russian hackers, deployed in 2016 against Ukraine's power grid. The attack left Kiev without power for an hour....

Stuxnet: The Malware That Introduced Cyberwarfare to the World
Massimiliano Brolli - August 2nd, 2025
Stuxnet is widely recognized as the malware par excellence, the one that introduced cyber warfare to the world, where pages and pages have been written and will continue to be...

WannaCry: The Ransomware That Changed the World of Cybersecurity
Massimiliano Brolli - August 2nd, 2025
May 12, 2017, was a special day. For many, it will mean nothing, but others will remember it well, because it was a hectic and eventful day as the world...

What is spyware: how it works and how it affects. The complete guide.
Redazione RHC - August 2nd, 2025
Spyware is malware (malicious programs) designed to infiltrate users' computer systems to monitor their activities and collect personal information. These programs can be installed on devices without the user's consent...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

