Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Crowdstrike 320×100
UtiliaCS 970x120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
WhatsApp Blocked in Russia: Messaging App Faces Crackdown
Di Redazione RHC - 28/11/2025

The Russian Federation’s Roskomnadzor has announced that it continues to impose systematic restrictions on the messaging app WhatsApp due to violations of Russian law. According to the agency, the s...

Immagine del sito
Shai-Hulud Worm Spreads Beyond npm, Attacks Maven
Di Redazione RHC - 28/11/2025

The Shai-Hulud worm has spread beyond the npm ecosystem and was discovered in Maven . Socket specialists noticed an infected package on Maven Central containing the same malicious components used in t...

Immagine del sito
11.7% of jobs could be replaced by artificial intelligence
Di Redazione RHC - 28/11/2025

Artificial intelligence is currently capable of performing work equivalent to 11.7% of US employment . And not just in theory: in terms of monetary value, this value is already comparable to the salar...

Immagine del sito
Tor Boosts Security with Counter Galois Onion CGO Encryption
Di Redazione RHC - 27/11/2025

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

Immagine del sito
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Di Redazione RHC - 26/11/2025

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

ToolShell: The New Threat Affecting Microsoft SharePoint Servers

An advanced cyberattack campaign has been detected targeting Microsoft SharePoint servers. This threat exploits a series of vulnerabilities, known as ...
Redazione RHC - 21/07/2025 - 07:51

Uncle Bot, the humanoid robot that’s conquering China and scaring the US

A humanoid robot dressed in casual clothes, resembling an average man, has gained unexpected popularity in China. Nicknamed "Uncle Bot on the internet...
Redazione RHC - 20/07/2025 - 21:57

Viral Minds: How the Internet Turned Social Contagion Into a Global Psychological Weapon

Stop scrolling for a moment and look around you. Every meme, every viral video, every outrage-fueled hashtag, are you sure you chose them? Or did they...
Ashleigh Crause - 20/07/2025 - 21:07

Millions of vehicles at risk of RCE attacks via the PerfektBlue Bluetooth bug

Four vulnerabilities, dubbed PerfektBlue, affect OpenSynergy's Bluetooth BlueSDK stack. The vulnerabilities allow remote execution of arbitrary code a...
Redazione RHC - 20/07/2025 - 20:57

Mercedes-Benz and Microsoft are teaming up to integrate Teams and Copilot 365 into cars starting this summer.

On July 16, Mercedes-Benz announced in a press release the expansion of its collaboration with Microsoft, introducing the latest Office solutions and ...
Redazione RHC - 20/07/2025 - 16:23

What is ICT Risk Management? A process that supports cybersecurity.

ICT Risk Management is a process that identifies, assesses, and manages risks related to the use of information and communications technologies (ICT)....
Redazione RHC - 20/07/2025 - 10:55

ToolShell: The New Threat Affecting Microsoft SharePoint Servers

- July 20th, 2025

An advanced cyberattack campaign has been detected targeting Microsoft SharePoint servers. This threat exploits a series of vulnerabilities, known as "ToolShell," which allows attackers to gain complete and remote control...

Facebook Linkedin X

Uncle Bot, the humanoid robot that’s conquering China and scaring the US

- July 19th, 2025

A humanoid robot dressed in casual clothes, resembling an average man, has gained unexpected popularity in China. Nicknamed "Uncle Bot on the internet, it rose to fame thanks to a...

Facebook Linkedin X

Viral Minds: How the Internet Turned Social Contagion Into a Global Psychological Weapon

- July 19th, 2025

Stop scrolling for a moment and look around you. Every meme, every viral video, every outrage-fueled hashtag, are you sure you chose them? Or did they choose you? We like...

Facebook Linkedin X

Millions of vehicles at risk of RCE attacks via the PerfektBlue Bluetooth bug

- July 19th, 2025

Four vulnerabilities, dubbed PerfektBlue, affect OpenSynergy's Bluetooth BlueSDK stack. The vulnerabilities allow remote execution of arbitrary code and could contribute to accessing critical components in vehicles from manufacturers such as...

Facebook Linkedin X

Mercedes-Benz and Microsoft are teaming up to integrate Teams and Copilot 365 into cars starting this summer.

- July 19th, 2025

On July 16, Mercedes-Benz announced in a press release the expansion of its collaboration with Microsoft, introducing the latest Office solutions and collaboration tools, including an updated version of the...

Facebook Linkedin X

What is ICT Risk Management? A process that supports cybersecurity.

- July 19th, 2025

ICT Risk Management is a process that identifies, assesses, and manages risks related to the use of information and communications technologies (ICT). It is a fundamental aspect for any organization...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE