Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
320x100 Itcentric
UtiliaCS 970x120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Shai-Hulud Worm Spreads Beyond npm, Attacks Maven
Di Redazione RHC - 28/11/2025

The Shai-Hulud worm has spread beyond the npm ecosystem and was discovered in Maven . Socket specialists noticed an infected package on Maven Central containing the same malicious components used in t...

Immagine del sito
11.7% of jobs could be replaced by artificial intelligence
Di Redazione RHC - 28/11/2025

Artificial intelligence is currently capable of performing work equivalent to 11.7% of US employment . And not just in theory: in terms of monetary value, this value is already comparable to the salar...

Immagine del sito
Tor Boosts Security with Counter Galois Onion CGO Encryption
Di Redazione RHC - 27/11/2025

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

Immagine del sito
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Di Redazione RHC - 26/11/2025

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Immagine del sito
Investment Scam Alert: How to Avoid Losing Thousands
Di Redazione RHC - 26/11/2025

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

Is the Linux kernel moving toward “vibe coding”? Rules for using AI assistants are coming soon.

Sasha Levin, a longtime Linux kernel developer at NVIDIA and previously at Google and Microsoft, has proposed adding formal rules for using AI assista...
Redazione RHC - 26/07/2025 - 19:16

Google is turning the web into a showcase for AI! A near-term disaster for the digital economy.

Google is turning its search engine into a showcase for artificial intelligence, and that could spell disaster for the entire digital economy. Accordi...
Redazione RHC - 26/07/2025 - 16:33

Koske: Linux Malware Developed with Artificial Intelligence

AquaSec analysts have discovered a new Linux malware. The malware is called Koske and is believed to have been developed using artificial intelligence...
Redazione RHC - 26/07/2025 - 16:32

Beyond the Code: When AI Reminds Us Who We Are

We are at a crossroads. Not just any crossroads, but an existential one. Artificial Intelligence is no longer science fiction; it is the fog gathering...
Redazione RHC - 26/07/2025 - 10:13

SharePoint Exploits Are Underway: Businesses and Organizations in the Crosshairs

The threat landscape never sleeps, but this time it woke up with a bang. On July 18, 2025, security firm Eye Security issued a warning that immediatel...
Redazione RHC - 26/07/2025 - 10:13

A hacker compromises Amazon Q. Data is erased from users’ computers with a prompt from Wiper.

A hacker compromised the digital assistant Q by injecting commands that instructed it to wipe data from users' computers. Amazon included the update i...
Redazione RHC - 25/07/2025 - 15:00

Is the Linux kernel moving toward “vibe coding”? Rules for using AI assistants are coming soon.

- July 25th, 2025

Sasha Levin, a longtime Linux kernel developer at NVIDIA and previously at Google and Microsoft, has proposed adding formal rules for using AI assistants in development to the kernel documentation....

Facebook Linkedin X

Google is turning the web into a showcase for AI! A near-term disaster for the digital economy.

- July 25th, 2025

Google is turning its search engine into a showcase for artificial intelligence, and that could spell disaster for the entire digital economy. According to a new study from the Pew...

Facebook Linkedin X

Koske: Linux Malware Developed with Artificial Intelligence

- July 25th, 2025

AquaSec analysts have discovered a new Linux malware. The malware is called Koske and is believed to have been developed using artificial intelligence. It uses panda JPEG images to inject...

Facebook Linkedin X

Beyond the Code: When AI Reminds Us Who We Are

- July 25th, 2025

We are at a crossroads. Not just any crossroads, but an existential one. Artificial Intelligence is no longer science fiction; it is the fog gathering on our path, redefining every...

Facebook Linkedin X

SharePoint Exploits Are Underway: Businesses and Organizations in the Crosshairs

- July 25th, 2025

The threat landscape never sleeps, but this time it woke up with a bang. On July 18, 2025, security firm Eye Security issued a warning that immediately resonated throughout the...

Facebook Linkedin X

A hacker compromises Amazon Q. Data is erased from users’ computers with a prompt from Wiper.

- July 24th, 2025

A hacker compromised the digital assistant Q by injecting commands that instructed it to wipe data from users' computers. Amazon included the update in its public release. Amazon Q is...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE