Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The Shai-Hulud worm has spread beyond the npm ecosystem and was discovered in Maven . Socket specialists noticed an infected package on Maven Central containing the same malicious components used in t...

Artificial intelligence is currently capable of performing work equivalent to 11.7% of US employment . And not just in theory: in terms of monetary value, this value is already comparable to the salar...

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...
OpenAI’s experimental model wins gold medal at the Mathematical Olympiad.
Microsoft reduces AI’s environmental impact with human and agricultural waste.
Discovering the Cyber Kill Chain. Defend your network and learn how to attack and defend yourself.
What is Cyber Threat Intelligence? Let’s explore a fundamental discipline in cybersecurity.
What is Open Source Intelligence (OSINT). Its importance and necessity in today’s world.
What are Vulnerability Assessments? A Journey into Automated Software Vulnerability Scanning

OpenAI’s experimental model wins gold medal at the Mathematical Olympiad.
Redazione RHC - July 26th, 2025
OpenAI has reached a new milestone in the development of artificial intelligence: its experimental model achieved "gold medal" results at the International Mathematical Olympiad, according to Alexander Wei, an OpenAI...

Microsoft reduces AI’s environmental impact with human and agricultural waste.
Redazione RHC - July 26th, 2025
Microsoft has decided to reduce the environmental impact of its artificial intelligence by turning to a seemingly unlikely resource: human and agricultural waste. The company has signed a contract with...

Discovering the Cyber Kill Chain. Defend your network and learn how to attack and defend yourself.
Redazione RHC - July 25th, 2025
In the digital age, cybersecurity has become a priority for businesses and individuals. Among the most fearsome threats are cyberattacks, targeted intrusions that can cause significant damage, both financially and...

What is Cyber Threat Intelligence? Let’s explore a fundamental discipline in cybersecurity.
Redazione RHC - July 25th, 2025
Cyber Threat Intelligence (CTI) is the practice of collecting, analyzing, and using cyber threat information to protect organizations from malicious activity. CTI has become a key element of cybersecurity, helping...

What is Open Source Intelligence (OSINT). Its importance and necessity in today’s world.
Redazione RHC - July 25th, 2025
The web contains a sea of information. Between social networks, newspapers, specialized magazines, images, radio, and television... we use and produce a sea of public domain data, from which we...

What are Vulnerability Assessments? A Journey into Automated Software Vulnerability Scanning
Redazione RHC - July 25th, 2025
A vulnerability assessment is a process of evaluating computer systems, networks, and applications to identify vulnerabilities that could be exploited by attackers to compromise the system's security. The primary goal...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

