Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
320x100 Itcentric
2nd Edition GlitchZone RHC 970x120 2

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Shai-Hulud Worm Spreads Beyond npm, Attacks Maven
Di Redazione RHC - 28/11/2025

The Shai-Hulud worm has spread beyond the npm ecosystem and was discovered in Maven . Socket specialists noticed an infected package on Maven Central containing the same malicious components used in t...

Immagine del sito
11.7% of jobs could be replaced by artificial intelligence
Di Redazione RHC - 28/11/2025

Artificial intelligence is currently capable of performing work equivalent to 11.7% of US employment . And not just in theory: in terms of monetary value, this value is already comparable to the salar...

Immagine del sito
Tor Boosts Security with Counter Galois Onion CGO Encryption
Di Redazione RHC - 27/11/2025

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

Immagine del sito
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Di Redazione RHC - 26/11/2025

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Immagine del sito
Investment Scam Alert: How to Avoid Losing Thousands
Di Redazione RHC - 26/11/2025

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

OpenAI’s experimental model wins gold medal at the Mathematical Olympiad.

OpenAI has reached a new milestone in the development of artificial intelligence: its experimental model achieved "gold medal" results at the Internat...
Redazione RHC - 27/07/2025 - 09:49

Microsoft reduces AI’s environmental impact with human and agricultural waste.

Microsoft has decided to reduce the environmental impact of its artificial intelligence by turning to a seemingly unlikely resource: human and agricul...
Redazione RHC - 27/07/2025 - 09:49

Discovering the Cyber Kill Chain. Defend your network and learn how to attack and defend yourself.

In the digital age, cybersecurity has become a priority for businesses and individuals. Among the most fearsome threats are cyberattacks, targeted int...
Redazione RHC - 26/07/2025 - 19:41

What is Cyber Threat Intelligence? Let’s explore a fundamental discipline in cybersecurity.

Cyber Threat Intelligence (CTI) is the practice of collecting, analyzing, and using cyber threat information to protect organizations from malicious a...
Redazione RHC - 26/07/2025 - 19:40

What is Open Source Intelligence (OSINT). Its importance and necessity in today’s world.

The web contains a sea of information. Between social networks, newspapers, specialized magazines, images, radio, and television... we use and prod...
Redazione RHC - 26/07/2025 - 19:39

What are Vulnerability Assessments? A Journey into Automated Software Vulnerability Scanning

A vulnerability assessment is a process of evaluating computer systems, networks, and applications to identify vulnerabilities that could be exploited...
Redazione RHC - 26/07/2025 - 19:36

OpenAI’s experimental model wins gold medal at the Mathematical Olympiad.

- July 26th, 2025

OpenAI has reached a new milestone in the development of artificial intelligence: its experimental model achieved "gold medal" results at the International Mathematical Olympiad, according to Alexander Wei, an OpenAI...

Facebook Linkedin X

Microsoft reduces AI’s environmental impact with human and agricultural waste.

- July 26th, 2025

Microsoft has decided to reduce the environmental impact of its artificial intelligence by turning to a seemingly unlikely resource: human and agricultural waste. The company has signed a contract with...

Facebook Linkedin X

Discovering the Cyber Kill Chain. Defend your network and learn how to attack and defend yourself.

- July 25th, 2025

In the digital age, cybersecurity has become a priority for businesses and individuals. Among the most fearsome threats are cyberattacks, targeted intrusions that can cause significant damage, both financially and...

Facebook Linkedin X

What is Cyber Threat Intelligence? Let’s explore a fundamental discipline in cybersecurity.

- July 25th, 2025

Cyber Threat Intelligence (CTI) is the practice of collecting, analyzing, and using cyber threat information to protect organizations from malicious activity. CTI has become a key element of cybersecurity, helping...

Facebook Linkedin X

What is Open Source Intelligence (OSINT). Its importance and necessity in today’s world.

- July 25th, 2025

The web contains a sea of information. Between social networks, newspapers, specialized magazines, images, radio, and television... we use and produce a sea of public domain data, from which we...

Facebook Linkedin X

What are Vulnerability Assessments? A Journey into Automated Software Vulnerability Scanning

- July 25th, 2025

A vulnerability assessment is a process of evaluating computer systems, networks, and applications to identify vulnerabilities that could be exploited by attackers to compromise the system's security. The primary goal...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE