Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The Shai-Hulud worm has spread beyond the npm ecosystem and was discovered in Maven . Socket specialists noticed an infected package on Maven Central containing the same malicious components used in t...

Artificial intelligence is currently capable of performing work equivalent to 11.7% of US employment . And not just in theory: in terms of monetary value, this value is already comparable to the salar...

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...
Raven Stealer is here! The malware that steals your data by using Telegram as a “training tool.”
AI assistants lie! After generating errors: “I was panicking.”
Sanctions are taking effect! Zhaoxin introduces KH-5000 server processors and KX-7000N desktop chip.
The United States is cutting spending on cybersecurity again and it’s a storm
What is tailgating? When penetration tests aren’t enough and the Red Team needs physical security checks.
What is a Bug Bounty and what is a responsible disclosure program?

Raven Stealer is here! The malware that steals your data by using Telegram as a “training tool.”
Redazione RHC - July 29th, 2025
Amid growing activity by malicious campaigns using legitimate communication channels to bypass traditional defenses, a new tool has attracted the attention of cybersecurity specialists: Raven Stealer. This information-stealing program appeared...

AI assistants lie! After generating errors: “I was panicking.”
Redazione RHC - July 29th, 2025
AI-powered programming assistants present themselves as tools capable of transforming any English text into working code. Users no longer need to know language syntax, debug commands, or understand file structures:...

Sanctions are taking effect! Zhaoxin introduces KH-5000 server processors and KX-7000N desktop chip.
Redazione RHC - July 29th, 2025
The Chinese company Zhaoxin presented a new generation of KH-5000 server processors at Expo 2025 in Shanghai. These chips are intended for the domestic market and should significantly strengthen the...

The United States is cutting spending on cybersecurity again and it’s a storm
Redazione RHC - July 28th, 2025
In the first months of Donald Trump's new presidency, the U.S. federal government made drastic cuts to cybersecurity spending, cutting budgets, staff, and a range of initiatives aimed at protecting...

What is tailgating? When penetration tests aren’t enough and the Red Team needs physical security checks.
Redazione RHC - July 28th, 2025
In red teaming, the term "tailgating" refers to a technique in which a team member attempts to gain unauthorized access to a protected area or computer system, such as by...

What is a Bug Bounty and what is a responsible disclosure program?
Redazione RHC - July 28th, 2025
In recent years, concerns about cybersecurity have grown exponentially. The increase in cyber attacks, the advancement of hacking techniques, and the ever-increasing importance of personal data have led many companies...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

