Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Crowdstrike 320×100
Banner Ransomfeed 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Shai-Hulud Worm Spreads Beyond npm, Attacks Maven
Di Redazione RHC - 28/11/2025

The Shai-Hulud worm has spread beyond the npm ecosystem and was discovered in Maven . Socket specialists noticed an infected package on Maven Central containing the same malicious components used in t...

Immagine del sito
11.7% of jobs could be replaced by artificial intelligence
Di Redazione RHC - 28/11/2025

Artificial intelligence is currently capable of performing work equivalent to 11.7% of US employment . And not just in theory: in terms of monetary value, this value is already comparable to the salar...

Immagine del sito
Tor Boosts Security with Counter Galois Onion CGO Encryption
Di Redazione RHC - 27/11/2025

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

Immagine del sito
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Di Redazione RHC - 26/11/2025

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Immagine del sito
Investment Scam Alert: How to Avoid Losing Thousands
Di Redazione RHC - 26/11/2025

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

Red Hot Cyber Conference 2026. The fifth edition in Rome on Monday, May 18th and Tuesday, May 19th.

The Red Hot Cyber Conference is back! After the great success of the third and fourth editions, the free annual event created by the RHC community...
Redazione RHC - 23/07/2025 - 11:47

Patriotic Code: From DDoSia and NoName057(16) to CISM, the algorithm that shapes youth for Putin

In February 2025 we had already observed the functioning of DDoSIA, the crowd-hacking system promoted by NoName057(16): a client distributed via Teleg...
Simone D'Agostino - 23/07/2025 - 11:42

Critical Vulnerabilities in Cisco ISE: Urgent Updates Needed

The recently discovered critical vulnerabilities in Cisco infrastructure are already being actively exploited by attackers to attack corporate network...
Redazione RHC - 23/07/2025 - 10:29

The AI Revolution and How It Will Change the World

In the contemporary technological landscape, one transformative force clearly emerges: Artificial Intelligence (AI). AI is revolutionizing our world i...
Redazione RHC - 23/07/2025 - 08:30

History of Artificial Intelligence. From the 1950s to the present day.

Artificial intelligence (AI) is a discipline that aims to develop systems capable of emulating some of human cognitive abilities. Over the years, ...
Redazione RHC - 23/07/2025 - 08:29

Artificial Intelligence: History, Technology, Ethics, Regulations, and the Future

Artificial intelligence (AI) is software that can generate output (i.e., content, predictions, decisions, recommendations) capable of interacting wit...
Redazione RHC - 23/07/2025 - 08:28

Red Hot Cyber Conference 2026. The fifth edition in Rome on Monday, May 18th and Tuesday, May 19th.

- July 22nd, 2025

The Red Hot Cyber Conference is back! After the great success of the third and fourth editions, the free annual event created by the RHC community is back! An event...

Facebook Linkedin X

Patriotic Code: From DDoSia and NoName057(16) to CISM, the algorithm that shapes youth for Putin

- July 22nd, 2025

In February 2025 we had already observed the functioning of DDoSIA, the crowd-hacking system promoted by NoName057(16): a client distributed via Telegram, DDoS attacks against European targets, rewards in cryptocurrencies.A...

Facebook Linkedin X

Critical Vulnerabilities in Cisco ISE: Urgent Updates Needed

- July 22nd, 2025

The recently discovered critical vulnerabilities in Cisco infrastructure are already being actively exploited by attackers to attack corporate networks. The company has officially confirmed that its Public Security Incident Response...

Facebook Linkedin X

The AI Revolution and How It Will Change the World

- July 22nd, 2025

In the contemporary technological landscape, one transformative force clearly emerges: Artificial Intelligence (AI). AI is revolutionizing our world in ways we would have struggled to imagine just a few decades...

Facebook Linkedin X

History of Artificial Intelligence. From the 1950s to the present day.

- July 22nd, 2025

Artificial intelligence (AI) is a discipline that aims to develop systems capable of emulating some of human cognitive abilities. Over the years, AI has gone through different phases, with periods...

Facebook Linkedin X

Artificial Intelligence

Artificial Intelligence: History, Technology, Ethics, Regulations, and the Future

- July 22nd, 2025

Artificial intelligence (AI) is software that can generate output (i.e., content, predictions, decisions, recommendations) capable of interacting with the environment and according to human objectives. The spread of this technology...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE