Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
TM RedHotCyber 320x100 042514
UtiliaCS 970x120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Tor Boosts Security with Counter Galois Onion CGO Encryption
Di Redazione RHC - 27/11/2025

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

Immagine del sito
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Di Redazione RHC - 26/11/2025

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Immagine del sito
Investment Scam Alert: How to Avoid Losing Thousands
Di Redazione RHC - 26/11/2025

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

Immagine del sito
Malware Uses Finger Command to Infect Windows Devices
Di Redazione RHC - 26/11/2025

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

Immagine del sito
The AGI Revolution: How Mark Gubrud’s Term Changed Tech Forever
Di Redazione RHC - 25/11/2025

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...

Backdoor Alert! China Concerned About Possible Interference Through Nvidia Chips

The Cyberspace Administration of China (CAC) has expressed concern about the recent US proposal to integrate tracking and localization capabilities in...
Redazione RHC - 02/08/2025 - 16:11

Microsoft Edge launches Copilot mode, following Chrome’s lead.

After two years of small changes to the Edge browser's AI features, Microsoft recently added Copilot mode to the Edge browser, officially entering the...
Redazione RHC - 02/08/2025 - 10:49

Vibe Coding Goes Wild. AI Generates Vulnerable Code, But No One Cares

Artificial intelligence is increasingly becoming a programmers' assistant, but a Veracode study has shown that convenience comes with a security risk....
Redazione RHC - 02/08/2025 - 10:34

ChatGPT chats shared on Google! Privacy threat or SEO opportunity?

Google has started indexing ChatGPT conversations that users share using the "Share" button. The issue first came to light thanks to a Fast Company in...
Redazione RHC - 02/08/2025 - 08:09

Russia introduces fines for accessing extremist material via VPN

Russian President Vladimir Putin signed a law establishing administrative liability for VPN service owners and introducing fines for those who deliber...
Redazione RHC - 02/08/2025 - 07:56

Google Strengthens Security with Device Bound Session Credentials, Passkeys, and New Zero-Day Policies

Google is pushing the boundaries of security with a new initiative, makingDevice Bound Session Credentials (DBSC) a public beta feature that helps pro...
Redazione RHC - 02/08/2025 - 07:45

Backdoor Alert! China Concerned About Possible Interference Through Nvidia Chips

- August 1st, 2025

The Cyberspace Administration of China (CAC) has expressed concern about the recent US proposal to integrate tracking and localization capabilities into advanced chips intended for export. This measure could jeopardize...

Facebook Linkedin X

Microsoft Edge launches Copilot mode, following Chrome’s lead.

- August 1st, 2025

After two years of small changes to the Edge browser's AI features, Microsoft recently added Copilot mode to the Edge browser, officially entering the AI browser market. Specifically, the AI...

Facebook Linkedin X

Vibe Coding Goes Wild. AI Generates Vulnerable Code, But No One Cares

- August 1st, 2025

Artificial intelligence is increasingly becoming a programmers' assistant, but a Veracode study has shown that convenience comes with a security risk. An analysis of 100 top language models (LLMs) revealed...

Facebook Linkedin X

ChatGPT chats shared on Google! Privacy threat or SEO opportunity?

- August 1st, 2025

Google has started indexing ChatGPT conversations that users share using the "Share" button. The issue first came to light thanks to a Fast Company investigation, which revealed—through the use of...

Facebook Linkedin X

Russia introduces fines for accessing extremist material via VPN

- August 1st, 2025

Russian President Vladimir Putin signed a law establishing administrative liability for VPN service owners and introducing fines for those who deliberately search for and gain access to extremist material. Last...

Facebook Linkedin X

Google Strengthens Security with Device Bound Session Credentials, Passkeys, and New Zero-Day Policies

- August 1st, 2025

Google is pushing the boundaries of security with a new initiative, makingDevice Bound Session Credentials (DBSC) a public beta feature that helps protect users from session cookie theft. Initially introduced...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE