Red Hot Cyber. The Cybersecurity Blog
Featured Articles

Artificial intelligence is currently capable of performing work equivalent to 11.7% of US employment . And not just in theory: in terms of monetary value, this value is already comparable to the salar...

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...
Lovense writes to Red Hot Cyber. The CEO provides clarification on security vulnerabilities.
McDonald’s Scam! 10,000 People Lured to Instagram and Facebook with a Fake Promo
Analysis of the Silver Fox Trojan’s Google Translate-imitating attack campaign
Auto-Color malware distributed via a vulnerability in SAP NetWeaver
Oscar-winning bug for macOS/iOS! An encrypted email causes the device to crash.
Mr Robot Teaches: A Raspberry Pi with 4G support used by hackers to access a bank’s network

Lovense writes to Red Hot Cyber. The CEO provides clarification on security vulnerabilities.
Redazione RHC - July 31st, 2025
Regarding our previous article about security bugs discovered in Lovesense devices (a leading company in the field of intimacy technology devices), the company has released an official statement to Red...

McDonald’s Scam! 10,000 People Lured to Instagram and Facebook with a Fake Promo
Redazione RHC - July 31st, 2025
Amid the proliferation of online scams, Romania witnessed a particularly large-scale scam disguised as a McDonald's promotion. More than 10,000 people were lured into a scam that initially presented itself...

Analysis of the Silver Fox Trojan’s Google Translate-imitating attack campaign
Redazione RHC - July 31st, 2025
According to the Knownsec 404 Advanced Threat Intelligence Team, a surge in attack activity has recently been observed involving the Silver Fox Trojan, which mimics popular tools such as Google...

Auto-Color malware distributed via a vulnerability in SAP NetWeaver
Redazione RHC - July 31st, 2025
Darktrace has recorded a targeted attack on a US chemical company, in which attackers exploited a critical vulnerability in the SAP NetWeaver platform. The threat, registered as CVE-2025-31324, consisted of...

Oscar-winning bug for macOS/iOS! An encrypted email causes the device to crash.
Redazione RHC - July 30th, 2025
Can an encrypted email cause a macOS/iOS system to crash immediately? The answer is YES! This is not a science fiction plot, but a real attack, as revealed by the...

Mr Robot Teaches: A Raspberry Pi with 4G support used by hackers to access a bank’s network
Redazione RHC - July 30th, 2025
It has been reported by Group-IB that a Raspberry Pi with 4G support was exploited by the hacker group UNC2891, also known as LightBasin, in order to overcome security measures...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

