Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Banner Mobile
970x120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
WhatsApp Blocked in Russia: Messaging App Faces Crackdown
Di Redazione RHC - 28/11/2025

The Russian Federation’s Roskomnadzor has announced that it continues to impose systematic restrictions on the messaging app WhatsApp due to violations of Russian law. According to the agency, the s...

Immagine del sito
Shai-Hulud Worm Spreads Beyond npm, Attacks Maven
Di Redazione RHC - 28/11/2025

The Shai-Hulud worm has spread beyond the npm ecosystem and was discovered in Maven . Socket specialists noticed an infected package on Maven Central containing the same malicious components used in t...

Immagine del sito
11.7% of jobs could be replaced by artificial intelligence
Di Redazione RHC - 28/11/2025

Artificial intelligence is currently capable of performing work equivalent to 11.7% of US employment . And not just in theory: in terms of monetary value, this value is already comparable to the salar...

Immagine del sito
Tor Boosts Security with Counter Galois Onion CGO Encryption
Di Redazione RHC - 27/11/2025

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

Immagine del sito
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Di Redazione RHC - 26/11/2025

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

History of Artificial Intelligence. From the 1950s to the present day.

Artificial intelligence (AI) is a discipline that aims to develop systems capable of emulating some of human cognitive abilities. Over the years, ...
Redazione RHC - 23/07/2025 - 08:29

Artificial Intelligence: History, Technology, Ethics, Regulations, and the Future

Artificial intelligence (AI) is software that can generate output (i.e., content, predictions, decisions, recommendations) capable of interacting wit...
Redazione RHC - 23/07/2025 - 08:28

Cyberattacks skyrocket in Europe! Every three minutes, a company is hit.

With the rapid growth of digital threats, businesses around the world are under cyberattack. According to the latest data from Check Point Research, e...
Redazione RHC - 23/07/2025 - 08:26

Discovering IaB JohnDoe7: Access for sale from the common man

We continue our series of articles on Initial Access Brokers with an article on JohnDoe7 (also known as LORD1), who, as we'll see later, uses a name/m...
Redazione RHC - 23/07/2025 - 08:24

Cyberattacks skyrocket in Europe! Every three minutes, a company is hit.

With the rapid growth of digital threats, businesses around the world are under cyberattack. According to the latest data from Check Point Research, e...
Redazione RHC - 23/07/2025 - 08:18

What are penetration tests, why are they done, who performs them, and the benefits for organizations.

Penetration testing is an increasingly widespread practice in the field of cybersecurity. It is a real simulation of a cyber attack, conducted by a t...
Redazione RHC - 22/07/2025 - 19:27

History of Artificial Intelligence. From the 1950s to the present day.

- July 22nd, 2025

Artificial intelligence (AI) is a discipline that aims to develop systems capable of emulating some of human cognitive abilities. Over the years, AI has gone through different phases, with periods...

Facebook Linkedin X

Artificial Intelligence

Artificial Intelligence: History, Technology, Ethics, Regulations, and the Future

- July 22nd, 2025

Artificial intelligence (AI) is software that can generate output (i.e., content, predictions, decisions, recommendations) capable of interacting with the environment and according to human objectives. The spread of this technology...

Facebook Linkedin X

Cyberattacks skyrocket in Europe! Every three minutes, a company is hit.

- July 22nd, 2025

With the rapid growth of digital threats, businesses around the world are under cyberattack. According to the latest data from Check Point Research, each organization experiences an average of 1,984...

Facebook Linkedin X

Discovering IaB JohnDoe7: Access for sale from the common man

- July 22nd, 2025

We continue our series of articles on Initial Access Brokers with an article on JohnDoe7 (also known as LORD1), who, as we'll see later, uses a name/moniker reminiscent of movies...

Facebook Linkedin X

Cyberattacks skyrocket in Europe! Every three minutes, a company is hit.

- July 22nd, 2025

With the rapid growth of digital threats, businesses around the world are under cyberattack. According to the latest data from Check Point Research, each organization experiences an average of 1,984...

Facebook Linkedin X

What are penetration tests, why are they done, who performs them, and the benefits for organizations.

- July 21st, 2025

Penetration testing is an increasingly widespread practice in the field of cybersecurity. It is a real simulation of a cyber attack, conducted by a team of security experts, in order...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE