Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The Russian Federation’s Roskomnadzor has announced that it continues to impose systematic restrictions on the messaging app WhatsApp due to violations of Russian law. According to the agency, the s...

The Shai-Hulud worm has spread beyond the npm ecosystem and was discovered in Maven . Socket specialists noticed an infected package on Maven Central containing the same malicious components used in t...

Artificial intelligence is currently capable of performing work equivalent to 11.7% of US employment . And not just in theory: in terms of monetary value, this value is already comparable to the salar...

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...
ToolShell: The New Threat Affecting Microsoft SharePoint Servers
Uncle Bot, the humanoid robot that’s conquering China and scaring the US
Viral Minds: How the Internet Turned Social Contagion Into a Global Psychological Weapon
Millions of vehicles at risk of RCE attacks via the PerfektBlue Bluetooth bug
Mercedes-Benz and Microsoft are teaming up to integrate Teams and Copilot 365 into cars starting this summer.
What is ICT Risk Management? A process that supports cybersecurity.

ToolShell: The New Threat Affecting Microsoft SharePoint Servers
Redazione RHC - July 20th, 2025
An advanced cyberattack campaign has been detected targeting Microsoft SharePoint servers. This threat exploits a series of vulnerabilities, known as "ToolShell," which allows attackers to gain complete and remote control...

Uncle Bot, the humanoid robot that’s conquering China and scaring the US
Redazione RHC - July 19th, 2025
A humanoid robot dressed in casual clothes, resembling an average man, has gained unexpected popularity in China. Nicknamed "Uncle Bot on the internet, it rose to fame thanks to a...

Viral Minds: How the Internet Turned Social Contagion Into a Global Psychological Weapon
Ashleigh Crause - July 19th, 2025
Stop scrolling for a moment and look around you. Every meme, every viral video, every outrage-fueled hashtag, are you sure you chose them? Or did they choose you? We like...

Millions of vehicles at risk of RCE attacks via the PerfektBlue Bluetooth bug
Redazione RHC - July 19th, 2025
Four vulnerabilities, dubbed PerfektBlue, affect OpenSynergy's Bluetooth BlueSDK stack. The vulnerabilities allow remote execution of arbitrary code and could contribute to accessing critical components in vehicles from manufacturers such as...

Mercedes-Benz and Microsoft are teaming up to integrate Teams and Copilot 365 into cars starting this summer.
Redazione RHC - July 19th, 2025
On July 16, Mercedes-Benz announced in a press release the expansion of its collaboration with Microsoft, introducing the latest Office solutions and collaboration tools, including an updated version of the...

What is ICT Risk Management? A process that supports cybersecurity.
Redazione RHC - July 19th, 2025
ICT Risk Management is a process that identifies, assesses, and manages risks related to the use of information and communications technologies (ICT). It is a fundamental aspect for any organization...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

