Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The Shai-Hulud worm has spread beyond the npm ecosystem and was discovered in Maven . Socket specialists noticed an infected package on Maven Central containing the same malicious components used in t...

Artificial intelligence is currently capable of performing work equivalent to 11.7% of US employment . And not just in theory: in terms of monetary value, this value is already comparable to the salar...

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...
Vibecoding to create ransomware: FunkSec cybergang uses AI for cyberattacks
Germany invests in cyborg insects and AI robots for military and civilian use.
What is Ethical Hacking: An Introduction to the Fascinating World of Ethical Hacking
The Key to Software Security: CVSS 4.0 and Vulnerability Management
What is Red Team? A journey into the world of offensive security experts.
Why responsible vulnerability disclosure is important.

Vibecoding to create ransomware: FunkSec cybergang uses AI for cyberattacks
Redazione RHC - July 27th, 2025
Kaspersky Lab specialists studied the activity of the FunkSec group, which emerged in late 2024. The group's main characteristics were: the use of AI-based tools (including in the development of...

Germany invests in cyborg insects and AI robots for military and civilian use.
Redazione RHC - July 26th, 2025
The events of recent years are rapidly changing the world, forcing us to rethink many aspects of economics and production, as well as seek new tools to solve current problems....

What is Ethical Hacking: An Introduction to the Fascinating World of Ethical Hacking
Redazione RHC - July 26th, 2025
Ethical Hacking is a fascinating yet enigmatic discipline. It's a field where ethics and technology merge to defend the digital world. If you're already intrigued by this mysterious world, or...

The Key to Software Security: CVSS 4.0 and Vulnerability Management
Redazione RHC - July 26th, 2025
How are software security vulnerabilities assessed? Is it possible to determine their severity? How can we determine the order in which to update code in the event of multiple vulnerabilities?...

What is Red Team? A journey into the world of offensive security experts.
Redazione RHC - July 26th, 2025
The evolution of cyber threats is a constant in today's world. Malicious individuals, often driven by financial, ideological, or other motivations, seek new ways to overcome organizations' digital and physical...

Why responsible vulnerability disclosure is important.
Redazione RHC - July 26th, 2025
We often talk about responsible vulnerability disclosure, but as we've already seen, very often this doesn't happen with a well-regulated approach, although there are several international ideas and best practices,...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

