Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
TM RedHotCyber 320x100 042514
LECS 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Shai-Hulud Worm Spreads Beyond npm, Attacks Maven
Di Redazione RHC - 28/11/2025

The Shai-Hulud worm has spread beyond the npm ecosystem and was discovered in Maven . Socket specialists noticed an infected package on Maven Central containing the same malicious components used in t...

Immagine del sito
11.7% of jobs could be replaced by artificial intelligence
Di Redazione RHC - 28/11/2025

Artificial intelligence is currently capable of performing work equivalent to 11.7% of US employment . And not just in theory: in terms of monetary value, this value is already comparable to the salar...

Immagine del sito
Tor Boosts Security with Counter Galois Onion CGO Encryption
Di Redazione RHC - 27/11/2025

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

Immagine del sito
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Di Redazione RHC - 26/11/2025

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Immagine del sito
Investment Scam Alert: How to Avoid Losing Thousands
Di Redazione RHC - 26/11/2025

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

Digital Forensics: The Science That Uncovers the Secrets Hidden in Data

Digital Forensics, or computer forensics, is a discipline that deals with the collection, preservation, analysis, and presentation of digital data for...
Sandro Sana - 29/07/2025 - 16:11

What are Living off the Land (LotL) attacks?

Living off the land means surviving on what you can forage, hunt, or grow, making the most of what nature provides. There could be multiple reasons fo...
Redazione RHC - 29/07/2025 - 16:10

10 steps to make your company cyber-secure: the RHC guide.

In recent weeks, cyber activity on the internet - due to the Russia-Ukraine conflict - has increased significantly. In recent years, ransomware attack...
Olivia Terragni - 29/07/2025 - 16:07

Who put the mouse in the trap? Malware was hidden in the Endgame Gear drivers.

Gaming peripheral manufacturer Endgame Gear reported that between June 26 and July 9, 2025, malware was inserted into the company's official website, ...
Redazione RHC - 29/07/2025 - 15:23

Your email is “vibrating”! A “hot” flaw in Lovense exposes users’ emails.

The Lovense platform, which has long carved out a niche market for itself with app-controlled sex toys (including models such as Lush, Gush, and Krake...
Redazione RHC - 29/07/2025 - 15:23

Quantum computers are slowly evolving. Although far away, they have surpassed a millisecond state of coherence.

Physicists at Aalto University (Finland) have set a new world record for the duration of the coherent state of a superconducting qubit, the core of a ...
Redazione RHC - 29/07/2025 - 12:34

Digital Forensics: The Science That Uncovers the Secrets Hidden in Data

- July 28th, 2025

Digital Forensics, or computer forensics, is a discipline that deals with the collection, preservation, analysis, and presentation of digital data for use as evidence in a legal context. This field...

Facebook Linkedin X

What are Living off the Land (LotL) attacks?

- July 28th, 2025

Living off the land means surviving on what you can forage, hunt, or grow, making the most of what nature provides. There could be multiple reasons for doing this: maybe...

Facebook Linkedin X

cybercognitivismo fabrizio saviano intervista

10 steps to make your company cyber-secure: the RHC guide.

- July 28th, 2025

In recent weeks, cyber activity on the internet - due to the Russia-Ukraine conflict - has increased significantly. In recent years, ransomware attacks have pushed Italy to third place among...

Facebook Linkedin X

Who put the mouse in the trap? Malware was hidden in the Endgame Gear drivers.

- July 28th, 2025

Gaming peripheral manufacturer Endgame Gear reported that between June 26 and July 9, 2025, malware was inserted into the company's official website, hidden in the OP1w 4k v2 mouse configuration...

Facebook Linkedin X

Your email is “vibrating”! A “hot” flaw in Lovense exposes users’ emails.

- July 28th, 2025

The Lovense platform, which has long carved out a niche market for itself with app-controlled sex toys (including models such as Lush, Gush, and Kraken), is affected by a security...

Facebook Linkedin X

Quantum computers are slowly evolving. Although far away, they have surpassed a millisecond state of coherence.

- July 28th, 2025

Physicists at Aalto University (Finland) have set a new world record for the duration of the coherent state of a superconducting qubit, the core of a quantum computer. They achieved...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE