Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The Shai-Hulud worm has spread beyond the npm ecosystem and was discovered in Maven . Socket specialists noticed an infected package on Maven Central containing the same malicious components used in t...

Artificial intelligence is currently capable of performing work equivalent to 11.7% of US employment . And not just in theory: in terms of monetary value, this value is already comparable to the salar...

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...
Red Hot Cyber Conference 2026. The fifth edition in Rome on Monday, May 18th and Tuesday, May 19th.
Patriotic Code: From DDoSia and NoName057(16) to CISM, the algorithm that shapes youth for Putin
Critical Vulnerabilities in Cisco ISE: Urgent Updates Needed
The AI Revolution and How It Will Change the World
History of Artificial Intelligence. From the 1950s to the present day.
Artificial Intelligence: History, Technology, Ethics, Regulations, and the Future

Red Hot Cyber Conference 2026. The fifth edition in Rome on Monday, May 18th and Tuesday, May 19th.
Redazione RHC - July 22nd, 2025
The Red Hot Cyber Conference is back! After the great success of the third and fourth editions, the free annual event created by the RHC community is back! An event...

Patriotic Code: From DDoSia and NoName057(16) to CISM, the algorithm that shapes youth for Putin
Simone D'Agostino - July 22nd, 2025
In February 2025 we had already observed the functioning of DDoSIA, the crowd-hacking system promoted by NoName057(16): a client distributed via Telegram, DDoS attacks against European targets, rewards in cryptocurrencies.A...

Critical Vulnerabilities in Cisco ISE: Urgent Updates Needed
Redazione RHC - July 22nd, 2025
The recently discovered critical vulnerabilities in Cisco infrastructure are already being actively exploited by attackers to attack corporate networks. The company has officially confirmed that its Public Security Incident Response...

The AI Revolution and How It Will Change the World
Redazione RHC - July 22nd, 2025
In the contemporary technological landscape, one transformative force clearly emerges: Artificial Intelligence (AI). AI is revolutionizing our world in ways we would have struggled to imagine just a few decades...

History of Artificial Intelligence. From the 1950s to the present day.
Redazione RHC - July 22nd, 2025
Artificial intelligence (AI) is a discipline that aims to develop systems capable of emulating some of human cognitive abilities. Over the years, AI has gone through different phases, with periods...

Artificial Intelligence: History, Technology, Ethics, Regulations, and the Future
Redazione RHC - July 22nd, 2025
Artificial intelligence (AI) is software that can generate output (i.e., content, predictions, decisions, recommendations) capable of interacting with the environment and according to human objectives. The spread of this technology...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

