Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The Shai-Hulud worm has spread beyond the npm ecosystem and was discovered in Maven . Socket specialists noticed an infected package on Maven Central containing the same malicious components used in t...

Artificial intelligence is currently capable of performing work equivalent to 11.7% of US employment . And not just in theory: in terms of monetary value, this value is already comparable to the salar...

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...
Is the Linux kernel moving toward “vibe coding”? Rules for using AI assistants are coming soon.
Google is turning the web into a showcase for AI! A near-term disaster for the digital economy.
Koske: Linux Malware Developed with Artificial Intelligence
Beyond the Code: When AI Reminds Us Who We Are
SharePoint Exploits Are Underway: Businesses and Organizations in the Crosshairs
A hacker compromises Amazon Q. Data is erased from users’ computers with a prompt from Wiper.

Is the Linux kernel moving toward “vibe coding”? Rules for using AI assistants are coming soon.
Redazione RHC - July 25th, 2025
Sasha Levin, a longtime Linux kernel developer at NVIDIA and previously at Google and Microsoft, has proposed adding formal rules for using AI assistants in development to the kernel documentation....

Google is turning the web into a showcase for AI! A near-term disaster for the digital economy.
Redazione RHC - July 25th, 2025
Google is turning its search engine into a showcase for artificial intelligence, and that could spell disaster for the entire digital economy. According to a new study from the Pew...

Koske: Linux Malware Developed with Artificial Intelligence
Redazione RHC - July 25th, 2025
AquaSec analysts have discovered a new Linux malware. The malware is called Koske and is believed to have been developed using artificial intelligence. It uses panda JPEG images to inject...

Beyond the Code: When AI Reminds Us Who We Are
Redazione RHC - July 25th, 2025
We are at a crossroads. Not just any crossroads, but an existential one. Artificial Intelligence is no longer science fiction; it is the fog gathering on our path, redefining every...

SharePoint Exploits Are Underway: Businesses and Organizations in the Crosshairs
Redazione RHC - July 25th, 2025
The threat landscape never sleeps, but this time it woke up with a bang. On July 18, 2025, security firm Eye Security issued a warning that immediately resonated throughout the...

A hacker compromises Amazon Q. Data is erased from users’ computers with a prompt from Wiper.
Redazione RHC - July 24th, 2025
A hacker compromised the digital assistant Q by injecting commands that instructed it to wipe data from users' computers. Amazon included the update in its public release. Amazon Q is...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

