Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Crowdstrike 320×100
LECS 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Tor Boosts Security with Counter Galois Onion CGO Encryption
Di Redazione RHC - 27/11/2025

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

Immagine del sito
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Di Redazione RHC - 26/11/2025

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Immagine del sito
Investment Scam Alert: How to Avoid Losing Thousands
Di Redazione RHC - 26/11/2025

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

Immagine del sito
Malware Uses Finger Command to Infect Windows Devices
Di Redazione RHC - 26/11/2025

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

Immagine del sito
The AGI Revolution: How Mark Gubrud’s Term Changed Tech Forever
Di Redazione RHC - 25/11/2025

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...

Discovering Wipers: The Silent Threat That Ruthlessly Destroys Data

Wider malware (in Italian "eliminator" or "deleter") is a type of malicious software designed to destroy or "erase" data and files on the computer sy...
Redazione RHC - 03/08/2025 - 10:56

What are Remote Access Trojans (RATs): The menacing shadow behind spam emails

Remote Access Trojans (RATs), or Remote Access Trojans, are a category of malware. They are designed to allow attackers to remotely control an infecte...
Redazione RHC - 03/08/2025 - 10:54

Elk Cloner. The first computer virus in history.

In the late 1990s, when the Internet was still very young, it was common for tech-savvy kids to scare their friends by controlling (or, in Internet pa...
Redazione RHC - 03/08/2025 - 10:53

SoftBank launches 4G and 5G base stations on stratospheric airships

SoftBank has announced that trials of 4G and 5G base stations installed on airships will begin in Japan in 2026. The airships will lift the equipment ...
Redazione RHC - 03/08/2025 - 09:38

New GhostContainer backdoor discovered that threatens Asian companies’ Exchange instances

Kaspersky Lab specialists have discovered a new backdoor called GhostContainer, based on open-source tools. Researchers believe the appearance of this...
Redazione RHC - 03/08/2025 - 09:37

It costs 5 iPhones, jumps, throws punches, but still doesn’t wash dishes. R1, the Chinese robot that’s taking the internet by storm.

In the increasingly crowded landscape of humanoid robots, the new Unitree R1 has made headlines not only for its acrobatic capabilities, but above all...
Redazione RHC - 02/08/2025 - 17:02

Discovering Wipers: The Silent Threat That Ruthlessly Destroys Data

- August 2nd, 2025

Wider malware (in Italian "eliminator" or "deleter") is a type of malicious software designed to destroy or "erase" data and files on the computer systems it infects. Unlike other types...

Facebook Linkedin X

What are Remote Access Trojans (RATs): The menacing shadow behind spam emails

- August 2nd, 2025

Remote Access Trojans (RATs), or Remote Access Trojans, are a category of malware. They are designed to allow attackers to remotely control an infected device. This malware is particularly dangerous...

Facebook Linkedin X

Elk Cloner. The first computer virus in history.

- August 2nd, 2025

In the late 1990s, when the Internet was still very young, it was common for tech-savvy kids to scare their friends by controlling (or, in Internet parlance, "trolling") their PCs...

Facebook Linkedin X

SoftBank launches 4G and 5G base stations on stratospheric airships

- August 2nd, 2025

SoftBank has announced that trials of 4G and 5G base stations installed on airships will begin in Japan in 2026. The airships will lift the equipment to an altitude of...

Facebook Linkedin X

New GhostContainer backdoor discovered that threatens Asian companies’ Exchange instances

- August 2nd, 2025

Kaspersky Lab specialists have discovered a new backdoor called GhostContainer, based on open-source tools. Researchers believe the appearance of this malware may be part of a sophisticated targeted campaign targeting...

Facebook Linkedin X

It costs 5 iPhones, jumps, throws punches, but still doesn’t wash dishes. R1, the Chinese robot that’s taking the internet by storm.

- August 1st, 2025

In the increasingly crowded landscape of humanoid robots, the new Unitree R1 has made headlines not only for its acrobatic capabilities, but above all for its unconventional price: around $5,900...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE