Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Banner Ransomfeed 320x100 1
TM RedHotCyber 970x120 042543

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
WhatsApp Blocked in Russia: Messaging App Faces Crackdown
Di Redazione RHC - 28/11/2025

The Russian Federation’s Roskomnadzor has announced that it continues to impose systematic restrictions on the messaging app WhatsApp due to violations of Russian law. According to the agency, the s...

Immagine del sito
Shai-Hulud Worm Spreads Beyond npm, Attacks Maven
Di Redazione RHC - 28/11/2025

The Shai-Hulud worm has spread beyond the npm ecosystem and was discovered in Maven . Socket specialists noticed an infected package on Maven Central containing the same malicious components used in t...

Immagine del sito
11.7% of jobs could be replaced by artificial intelligence
Di Redazione RHC - 28/11/2025

Artificial intelligence is currently capable of performing work equivalent to 11.7% of US employment . And not just in theory: in terms of monetary value, this value is already comparable to the salar...

Immagine del sito
Tor Boosts Security with Counter Galois Onion CGO Encryption
Di Redazione RHC - 27/11/2025

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

Immagine del sito
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Di Redazione RHC - 26/11/2025

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Google files suit against the BadBox2.0 botnet! A thought-provoking lawsuit against unknown individuals

Google has filed a lawsuit against the anonymous operators of the Android BadBox 2.0 botnet, accusing them of orchestrating a global fraud targeting t...
Redazione RHC - 19/07/2025 - 13:52

Jen-Hsun Huang: “I was born Chinese and became Chinese-American.” The ban on AI chips in China is a grave mistake.

According to Fast Technology on July 18, Jen-Hsun Huang told Chinese media about his origins, explaining that he was born Chinese and then became Chin...
Redazione RHC - 19/07/2025 - 13:52

What is Social Engineering? Uncovering an increasingly pervasive threat.

Social engineering is a psychological manipulation technique used to gain unauthorized access or information. Attackers exploit people's natural tende...
Redazione RHC - 19/07/2025 - 09:57

The World of Cybercrime: From Profit-Seeking Criminals to Hacktivists and State-Owned Hackers

The increasingly widespread use of digital technologies has opened up new opportunities for cybercriminals operating online, giving rise to a veritabl...
Redazione RHC - 19/07/2025 - 09:55

What is cyber hacktivism? History, motivations, hacking, consequences, and evolution.

The term "hacktivism" is a combination of the English terms "hacking" and "hacktivism" and was coined to describe the use of computer hacking for poli...
Redazione RHC - 19/07/2025 - 09:51

Disloyal employees. Let’s find out who they are and how to protect ourselves from this growing threat.

In the digital age, cybersecurity is a critical issue for any company handling sensitive data. However, not all risks are external. In fact, employees...
Redazione RHC - 19/07/2025 - 09:48

Google files suit against the BadBox2.0 botnet! A thought-provoking lawsuit against unknown individuals

- July 18th, 2025

Google has filed a lawsuit against the anonymous operators of the Android BadBox 2.0 botnet, accusing them of orchestrating a global fraud targeting the company's advertising platforms. BadBox is Android...

Facebook Linkedin X

Jen-Hsun Huang: “I was born Chinese and became Chinese-American.” The ban on AI chips in China is a grave mistake.

- July 18th, 2025

According to Fast Technology on July 18, Jen-Hsun Huang told Chinese media about his origins, explaining that he was born Chinese and then became Chinese-American. He emphasized how China is...

Facebook Linkedin X

What is Social Engineering? Uncovering an increasingly pervasive threat.

- July 18th, 2025

Social engineering is a psychological manipulation technique used to gain unauthorized access or information. Attackers exploit people's natural tendency to rely on trust and courtesy to convince them to provide...

Facebook Linkedin X

The World of Cybercrime: From Profit-Seeking Criminals to Hacktivists and State-Owned Hackers

- July 18th, 2025

The increasingly widespread use of digital technologies has opened up new opportunities for cybercriminals operating online, giving rise to a veritable cybercrime ecosystem. In this context, various actors can jeopardize...

Facebook Linkedin X

What is cyber hacktivism? History, motivations, hacking, consequences, and evolution.

- July 18th, 2025

The term "hacktivism" is a combination of the English terms "hacking" and "hacktivism" and was coined to describe the use of computer hacking for political or social purposes. It is...

Facebook Linkedin X

Disloyal employees. Let’s find out who they are and how to protect ourselves from this growing threat.

- July 18th, 2025

In the digital age, cybersecurity is a critical issue for any company handling sensitive data. However, not all risks are external. In fact, employees themselves often pose a threat to...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE