Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...
Discovering Wipers: The Silent Threat That Ruthlessly Destroys Data
What are Remote Access Trojans (RATs): The menacing shadow behind spam emails
Elk Cloner. The first computer virus in history.
SoftBank launches 4G and 5G base stations on stratospheric airships
New GhostContainer backdoor discovered that threatens Asian companies’ Exchange instances
It costs 5 iPhones, jumps, throws punches, but still doesn’t wash dishes. R1, the Chinese robot that’s taking the internet by storm.

Discovering Wipers: The Silent Threat That Ruthlessly Destroys Data
Redazione RHC - August 2nd, 2025
Wider malware (in Italian "eliminator" or "deleter") is a type of malicious software designed to destroy or "erase" data and files on the computer systems it infects. Unlike other types...

What are Remote Access Trojans (RATs): The menacing shadow behind spam emails
Redazione RHC - August 2nd, 2025
Remote Access Trojans (RATs), or Remote Access Trojans, are a category of malware. They are designed to allow attackers to remotely control an infected device. This malware is particularly dangerous...

Elk Cloner. The first computer virus in history.
Redazione RHC - August 2nd, 2025
In the late 1990s, when the Internet was still very young, it was common for tech-savvy kids to scare their friends by controlling (or, in Internet parlance, "trolling") their PCs...

SoftBank launches 4G and 5G base stations on stratospheric airships
Redazione RHC - August 2nd, 2025
SoftBank has announced that trials of 4G and 5G base stations installed on airships will begin in Japan in 2026. The airships will lift the equipment to an altitude of...

New GhostContainer backdoor discovered that threatens Asian companies’ Exchange instances
Redazione RHC - August 2nd, 2025
Kaspersky Lab specialists have discovered a new backdoor called GhostContainer, based on open-source tools. Researchers believe the appearance of this malware may be part of a sophisticated targeted campaign targeting...

It costs 5 iPhones, jumps, throws punches, but still doesn’t wash dishes. R1, the Chinese robot that’s taking the internet by storm.
Redazione RHC - August 1st, 2025
In the increasingly crowded landscape of humanoid robots, the new Unitree R1 has made headlines not only for its acrobatic capabilities, but above all for its unconventional price: around $5,900...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

