Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The Shai-Hulud worm has spread beyond the npm ecosystem and was discovered in Maven . Socket specialists noticed an infected package on Maven Central containing the same malicious components used in t...

Artificial intelligence is currently capable of performing work equivalent to 11.7% of US employment . And not just in theory: in terms of monetary value, this value is already comparable to the salar...

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...
What does a CISO do? Meet the Chief Information Security Officer: a beautiful but demanding position.
XSS.IS Silenced! Inside the investigation that shut down one of cybercrime’s most feared bazaars.
What is AIOps? How Artificial Intelligence Works for IT Operations
UK Says STOP Ransomware Attacks! Stop Public Administration Ransom Payments
SharePoint and CrowdStrike: Two Faces of the Same Digital Fragility
ToolShell: Microsoft SharePoint Zero-Day Vulnerability Has Been Under Attack Since Early July

What does a CISO do? Meet the Chief Information Security Officer: a beautiful but demanding position.
Redazione RHC - July 23rd, 2025
How many times have we heard this acronym: CISO? But how many of us don't know precisely what it means or have little in-depth knowledge of what a Chief Information...

XSS.IS Silenced! Inside the investigation that shut down one of cybercrime’s most feared bazaars.
Luca Stivali - July 23rd, 2025
Imagine opening your favorite forum bookmark, like every evening, to find new stealer variants or yet another batch of newly breached credentials. Instead of the usual noticeboard, a banner appears...

What is AIOps? How Artificial Intelligence Works for IT Operations
Redazione RHC - July 23rd, 2025
AIOps (Artificial Intelligence for IT Operations) is the application of artificial intelligence - such as machine learning, natural language processing, and advanced analytics - to automate, simplify, and optimize IT...

UK Says STOP Ransomware Attacks! Stop Public Administration Ransom Payments
Redazione RHC - July 23rd, 2025
The UK government has announced preparations for a radical measure to combat cybercrime: a ban on paying ransoms after ransomware attacks. The new ban applies to public sector organizations and...

SharePoint and CrowdStrike: Two Faces of the Same Digital Fragility
Redazione RHC - July 23rd, 2025
In recent days, the global digital landscape has been rocked by a cybersecurity bug that affected on-premise Microsoft SharePoint servers, exposing thousands of organizations to cyber attacks. These are not...

ToolShell: Microsoft SharePoint Zero-Day Vulnerability Has Been Under Attack Since Early July
Redazione RHC - July 23rd, 2025
According to cybersecurity experts, several Chinese hacker groups are exploiting a series of zero-day vulnerabilities in Microsoft SharePoint in their attacks. In particular, it emerged that attackers also compromised the...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

