Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
2nd Edition GlitchZone RHC 320x100 2
Enterprise BusinessLog 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Shai-Hulud Worm Spreads Beyond npm, Attacks Maven
Di Redazione RHC - 28/11/2025

The Shai-Hulud worm has spread beyond the npm ecosystem and was discovered in Maven . Socket specialists noticed an infected package on Maven Central containing the same malicious components used in t...

Immagine del sito
11.7% of jobs could be replaced by artificial intelligence
Di Redazione RHC - 28/11/2025

Artificial intelligence is currently capable of performing work equivalent to 11.7% of US employment . And not just in theory: in terms of monetary value, this value is already comparable to the salar...

Immagine del sito
Tor Boosts Security with Counter Galois Onion CGO Encryption
Di Redazione RHC - 27/11/2025

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

Immagine del sito
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Di Redazione RHC - 26/11/2025

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Immagine del sito
Investment Scam Alert: How to Avoid Losing Thousands
Di Redazione RHC - 26/11/2025

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

New macOS bug allows TCC bypass to steal user data

Microsoft said that attackers may have exploited a recently patched Transparency, Consent, and Control (TCC) bypass vulnerability to steal sensitive i...
Redazione RHC - 29/07/2025 - 12:33

New Phishing Attacks Using Fake Zoom Meetings Aim to Steal Corporate Credentials

A phishing attack that mimics an urgent Zoom meeting is being used by cybercriminals to steal corporate credentials, using a fake interface so realist...
Redazione RHC - 29/07/2025 - 09:52

Is Your Smart TV Spying on You? Security Gaps and Critical Vulnerabilities in IoT Devices

Networked smart devices are no longer simple helpers, but potential enemies. With every new thermostat or TV connected to the internet, a new flaw ope...
Redazione RHC - 29/07/2025 - 08:07

7,000 servers wiped out! Silent Crow and Cyberpartisans BY devastate Aeroflot in a historic cyber raid.

While the West battles ransomware attacks and private companies invest in defensive security, on the other side of the digital front, the war is being...
Luca Stivali - 29/07/2025 - 07:39

Boys recruited for murders and robberies: the FBI’s disturbing alert on the IRL Com group

The FBI has issued a warning about a rapidly growing threat from IRL Com, a subgroup of the underground group The Com that actively recruits teenagers...
Redazione RHC - 29/07/2025 - 07:16

Zero-click exploits: the new invisible frontier of cyber attacks

In recent years, cybersecurity has seen the emergence of increasingly sophisticated threats, capable of compromising devices and personal data without...
Redazione RHC - 29/07/2025 - 07:15

New macOS bug allows TCC bypass to steal user data

- July 28th, 2025

Microsoft said that attackers may have exploited a recently patched Transparency, Consent, and Control (TCC) bypass vulnerability to steal sensitive information from macOS users, including cached Apple Intelligence data. TCC...

Facebook Linkedin X

New Phishing Attacks Using Fake Zoom Meetings Aim to Steal Corporate Credentials

- July 28th, 2025

A phishing attack that mimics an urgent Zoom meeting is being used by cybercriminals to steal corporate credentials, using a fake interface so realistic it's nearly indistinguishable from a real...

Facebook Linkedin X

Is Your Smart TV Spying on You? Security Gaps and Critical Vulnerabilities in IoT Devices

- July 28th, 2025

Networked smart devices are no longer simple helpers, but potential enemies. With every new thermostat or TV connected to the internet, a new flaw opens up in the digital infrastructure...

Facebook Linkedin X

7,000 servers wiped out! Silent Crow and Cyberpartisans BY devastate Aeroflot in a historic cyber raid.

- July 28th, 2025

While the West battles ransomware attacks and private companies invest in defensive security, on the other side of the digital front, the war is being played out asymmetrically. On July...

Facebook Linkedin X

Boys recruited for murders and robberies: the FBI’s disturbing alert on the IRL Com group

- July 28th, 2025

The FBI has issued a warning about a rapidly growing threat from IRL Com, a subgroup of the underground group The Com that actively recruits teenagers to commit real-world crimes....

Facebook Linkedin X

Zero-click exploits: the new invisible frontier of cyber attacks

- July 28th, 2025

In recent years, cybersecurity has seen the emergence of increasingly sophisticated threats, capable of compromising devices and personal data without the user taking any action. Among these, so-called zero-click exploits...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE