Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The Shai-Hulud worm has spread beyond the npm ecosystem and was discovered in Maven . Socket specialists noticed an infected package on Maven Central containing the same malicious components used in t...

Artificial intelligence is currently capable of performing work equivalent to 11.7% of US employment . And not just in theory: in terms of monetary value, this value is already comparable to the salar...

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...
Digital Forensics: The Science That Uncovers the Secrets Hidden in Data
What are Living off the Land (LotL) attacks?
10 steps to make your company cyber-secure: the RHC guide.
Who put the mouse in the trap? Malware was hidden in the Endgame Gear drivers.
Your email is “vibrating”! A “hot” flaw in Lovense exposes users’ emails.
Quantum computers are slowly evolving. Although far away, they have surpassed a millisecond state of coherence.

Digital Forensics: The Science That Uncovers the Secrets Hidden in Data
Sandro Sana - July 28th, 2025
Digital Forensics, or computer forensics, is a discipline that deals with the collection, preservation, analysis, and presentation of digital data for use as evidence in a legal context. This field...

What are Living off the Land (LotL) attacks?
Redazione RHC - July 28th, 2025
Living off the land means surviving on what you can forage, hunt, or grow, making the most of what nature provides. There could be multiple reasons for doing this: maybe...

10 steps to make your company cyber-secure: the RHC guide.
Olivia Terragni - July 28th, 2025
In recent weeks, cyber activity on the internet - due to the Russia-Ukraine conflict - has increased significantly. In recent years, ransomware attacks have pushed Italy to third place among...

Who put the mouse in the trap? Malware was hidden in the Endgame Gear drivers.
Redazione RHC - July 28th, 2025
Gaming peripheral manufacturer Endgame Gear reported that between June 26 and July 9, 2025, malware was inserted into the company's official website, hidden in the OP1w 4k v2 mouse configuration...

Your email is “vibrating”! A “hot” flaw in Lovense exposes users’ emails.
Redazione RHC - July 28th, 2025
The Lovense platform, which has long carved out a niche market for itself with app-controlled sex toys (including models such as Lush, Gush, and Kraken), is affected by a security...

Quantum computers are slowly evolving. Although far away, they have surpassed a millisecond state of coherence.
Redazione RHC - July 28th, 2025
Physicists at Aalto University (Finland) have set a new world record for the duration of the coherent state of a superconducting qubit, the core of a quantum computer. They achieved...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

