Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Banner Ancharia Mobile 1
Banner Ancharia Desktop 1 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Shai-Hulud Worm Spreads Beyond npm, Attacks Maven
Di Redazione RHC - 28/11/2025

The Shai-Hulud worm has spread beyond the npm ecosystem and was discovered in Maven . Socket specialists noticed an infected package on Maven Central containing the same malicious components used in t...

Immagine del sito
11.7% of jobs could be replaced by artificial intelligence
Di Redazione RHC - 28/11/2025

Artificial intelligence is currently capable of performing work equivalent to 11.7% of US employment . And not just in theory: in terms of monetary value, this value is already comparable to the salar...

Immagine del sito
Tor Boosts Security with Counter Galois Onion CGO Encryption
Di Redazione RHC - 27/11/2025

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

Immagine del sito
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Di Redazione RHC - 26/11/2025

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Immagine del sito
Investment Scam Alert: How to Avoid Losing Thousands
Di Redazione RHC - 26/11/2025

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

Raven Stealer is here! The malware that steals your data by using Telegram as a “training tool.”

Amid growing activity by malicious campaigns using legitimate communication channels to bypass traditional defenses, a new tool has attracted the atte...
Redazione RHC - 30/07/2025 - 10:50

AI assistants lie! After generating errors: “I was panicking.”

AI-powered programming assistants present themselves as tools capable of transforming any English text into working code. Users no longer need to know...
Redazione RHC - 30/07/2025 - 07:12

Sanctions are taking effect! Zhaoxin introduces KH-5000 server processors and KX-7000N desktop chip.

The Chinese company Zhaoxin presented a new generation of KH-5000 server processors at Expo 2025 in Shanghai. These chips are intended for the domest...
Redazione RHC - 30/07/2025 - 07:07

The United States is cutting spending on cybersecurity again and it’s a storm

In the first months of Donald Trump's new presidency, the U.S. federal government made drastic cuts to cybersecurity spending, cutting budgets, staff,...
Redazione RHC - 29/07/2025 - 21:11

What is tailgating? When penetration tests aren’t enough and the Red Team needs physical security checks.

In red teaming, the term "tailgating" refers to a technique in which a team member attempts to gain unauthorized access to a protected area or compute...
Redazione RHC - 29/07/2025 - 16:17

What is a Bug Bounty and what is a responsible disclosure program?

In recent years, concerns about cybersecurity have grown exponentially. The increase in cyber attacks, the advancement of hacking techniques, and the ...
Redazione RHC - 29/07/2025 - 16:14

Raven Stealer is here! The malware that steals your data by using Telegram as a “training tool.”

- July 29th, 2025

Amid growing activity by malicious campaigns using legitimate communication channels to bypass traditional defenses, a new tool has attracted the attention of cybersecurity specialists: Raven Stealer. This information-stealing program appeared...

Facebook Linkedin X

AI assistants lie! After generating errors: “I was panicking.”

- July 29th, 2025

AI-powered programming assistants present themselves as tools capable of transforming any English text into working code. Users no longer need to know language syntax, debug commands, or understand file structures:...

Facebook Linkedin X

Sanctions are taking effect! Zhaoxin introduces KH-5000 server processors and KX-7000N desktop chip.

- July 29th, 2025

The Chinese company Zhaoxin presented a new generation of KH-5000 server processors at Expo 2025 in Shanghai. These chips are intended for the domestic market and should significantly strengthen the...

Facebook Linkedin X

The United States is cutting spending on cybersecurity again and it’s a storm

- July 28th, 2025

In the first months of Donald Trump's new presidency, the U.S. federal government made drastic cuts to cybersecurity spending, cutting budgets, staff, and a range of initiatives aimed at protecting...

Facebook Linkedin X

What is tailgating? When penetration tests aren’t enough and the Red Team needs physical security checks.

- July 28th, 2025

In red teaming, the term "tailgating" refers to a technique in which a team member attempts to gain unauthorized access to a protected area or computer system, such as by...

Facebook Linkedin X

What is a Bug Bounty and what is a responsible disclosure program?

- July 28th, 2025

In recent years, concerns about cybersecurity have grown exponentially. The increase in cyber attacks, the advancement of hacking techniques, and the ever-increasing importance of personal data have led many companies...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE