Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Banner Ransomfeed 320x100 1
Fortinet 970x120px

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Shai-Hulud Worm Spreads Beyond npm, Attacks Maven
Di Redazione RHC - 28/11/2025

The Shai-Hulud worm has spread beyond the npm ecosystem and was discovered in Maven . Socket specialists noticed an infected package on Maven Central containing the same malicious components used in t...

Immagine del sito
11.7% of jobs could be replaced by artificial intelligence
Di Redazione RHC - 28/11/2025

Artificial intelligence is currently capable of performing work equivalent to 11.7% of US employment . And not just in theory: in terms of monetary value, this value is already comparable to the salar...

Immagine del sito
Tor Boosts Security with Counter Galois Onion CGO Encryption
Di Redazione RHC - 27/11/2025

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

Immagine del sito
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Di Redazione RHC - 26/11/2025

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Immagine del sito
Investment Scam Alert: How to Avoid Losing Thousands
Di Redazione RHC - 26/11/2025

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

Vibecoding to create ransomware: FunkSec cybergang uses AI for cyberattacks

Kaspersky Lab specialists studied the activity of the FunkSec group, which emerged in late 2024. The group's main characteristics were: the use of AI-...
Redazione RHC - 28/07/2025 - 07:41

Germany invests in cyborg insects and AI robots for military and civilian use.

The events of recent years are rapidly changing the world, forcing us to rethink many aspects of economics and production, as well as seek new tools t...
Redazione RHC - 27/07/2025 - 11:50

What is Ethical Hacking: An Introduction to the Fascinating World of Ethical Hacking

Ethical Hacking is a fascinating yet enigmatic discipline. It's a field where ethics and technology merge to defend the digital world. If you're alrea...
Redazione RHC - 27/07/2025 - 09:54

The Key to Software Security: CVSS 4.0 and Vulnerability Management

How are software security vulnerabilities assessed? Is it possible to determine their severity? How can we determine the order in which to update code...
Redazione RHC - 27/07/2025 - 09:53

What is Red Team? A journey into the world of offensive security experts.

The evolution of cyber threats is a constant in today's world. Malicious individuals, often driven by financial, ideological, or other motivations, se...
Redazione RHC - 27/07/2025 - 09:51

Why responsible vulnerability disclosure is important.

We often talk about responsible vulnerability disclosure, but as we've already seen, very often this doesn't happen with a well-regulated approach, al...
Redazione RHC - 27/07/2025 - 09:50

Vibecoding to create ransomware: FunkSec cybergang uses AI for cyberattacks

- July 27th, 2025

Kaspersky Lab specialists studied the activity of the FunkSec group, which emerged in late 2024. The group's main characteristics were: the use of AI-based tools (including in the development of...

Facebook Linkedin X

Germany invests in cyborg insects and AI robots for military and civilian use.

- July 26th, 2025

The events of recent years are rapidly changing the world, forcing us to rethink many aspects of economics and production, as well as seek new tools to solve current problems....

Facebook Linkedin X

What is Ethical Hacking: An Introduction to the Fascinating World of Ethical Hacking

- July 26th, 2025

Ethical Hacking is a fascinating yet enigmatic discipline. It's a field where ethics and technology merge to defend the digital world. If you're already intrigued by this mysterious world, or...

Facebook Linkedin X

The Key to Software Security: CVSS 4.0 and Vulnerability Management

- July 26th, 2025

How are software security vulnerabilities assessed? Is it possible to determine their severity? How can we determine the order in which to update code in the event of multiple vulnerabilities?...

Facebook Linkedin X

What is Red Team? A journey into the world of offensive security experts.

- July 26th, 2025

The evolution of cyber threats is a constant in today's world. Malicious individuals, often driven by financial, ideological, or other motivations, seek new ways to overcome organizations' digital and physical...

Facebook Linkedin X

Why responsible vulnerability disclosure is important.

- July 26th, 2025

We often talk about responsible vulnerability disclosure, but as we've already seen, very often this doesn't happen with a well-regulated approach, although there are several international ideas and best practices,...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE