Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Crowdstrike 320×100
Banner Ransomfeed 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
WhatsApp Blocked in Russia: Messaging App Faces Crackdown
Di Redazione RHC - 28/11/2025

The Russian Federation’s Roskomnadzor has announced that it continues to impose systematic restrictions on the messaging app WhatsApp due to violations of Russian law. According to the agency, the s...

Immagine del sito
Shai-Hulud Worm Spreads Beyond npm, Attacks Maven
Di Redazione RHC - 28/11/2025

The Shai-Hulud worm has spread beyond the npm ecosystem and was discovered in Maven . Socket specialists noticed an infected package on Maven Central containing the same malicious components used in t...

Immagine del sito
11.7% of jobs could be replaced by artificial intelligence
Di Redazione RHC - 28/11/2025

Artificial intelligence is currently capable of performing work equivalent to 11.7% of US employment . And not just in theory: in terms of monetary value, this value is already comparable to the salar...

Immagine del sito
Tor Boosts Security with Counter Galois Onion CGO Encryption
Di Redazione RHC - 27/11/2025

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

Immagine del sito
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Di Redazione RHC - 26/11/2025

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Bullying and cyberbullying: what it is and how to protect yourself.

News reports are highlighting an ever-increasing number of cases of cyberbullying, some with dramatic outcomes (see incitement to suicide). Cyberbully...
Redazione RHC - 19/07/2025 - 09:47

What is Electronic Warfare (EW). Superiority in the Electromagnetic Spectrum

Electronic Warfare (EW) is one of the most sophisticated and strategically relevant disciplines in modern security. In an age dominated by technology,...
Redazione RHC - 19/07/2025 - 09:45

What is SIM Swapping? Here’s how it works.

These days, smartphones are in practically everyone's pockets. We use them for entertainment, sending messages, storing notes, taking photos, tran...
Redazione RHC - 19/07/2025 - 09:43

What are zero-day brokers? Discovering the underground market of security vulnerabilities

Zeroday brokers are intermediaries who buy and sell software vulnerabilities that are unknown to the manufacturers and organizations that use them. ...
Redazione RHC - 19/07/2025 - 09:41

Apache Tomcat DoS Vulnerability: CVE-2025-53506 Under Analysis

The Apache team recently fixed a denial-of-service (DoS) vulnerability classified as high severity. There's a new inconvenient guest in data centers a...
Redazione RHC - 19/07/2025 - 09:13

Magnus Carlsen beats ChatGPT at chess without losing a piece!

Magnus Carlsen beat ChatGPT at chess without losing a single piece, while his virtual opponent lost all his pawns. The Norwegian grandmaster posted sc...
Redazione RHC - 18/07/2025 - 19:34

Bullying and cyberbullying: what it is and how to protect yourself.

- July 18th, 2025

News reports are highlighting an ever-increasing number of cases of cyberbullying, some with dramatic outcomes (see incitement to suicide). Cyberbullying is a new form of psychological violence, an invasion and...

Facebook Linkedin X

What is Electronic Warfare (EW). Superiority in the Electromagnetic Spectrum

- July 18th, 2025

Electronic Warfare (EW) is one of the most sophisticated and strategically relevant disciplines in modern security. In an age dominated by technology, where information superiority can decide the outcome of...

Facebook Linkedin X

What is SIM Swapping? Here’s how it works.

- July 18th, 2025

These days, smartphones are in practically everyone's pockets. We use them for entertainment, sending messages, storing notes, taking photos, transferring money, and even "making phone calls," which is what they...

Facebook Linkedin X

What are zero-day brokers? Discovering the underground market of security vulnerabilities

- July 18th, 2025

Zeroday brokers are intermediaries who buy and sell software vulnerabilities that are unknown to the manufacturers and organizations that use them. These vulnerabilities, known as "zerodays," are exploited by cybercriminals...

Facebook Linkedin X

Apache Tomcat DoS Vulnerability: CVE-2025-53506 Under Analysis

- July 18th, 2025

The Apache team recently fixed a denial-of-service (DoS) vulnerability classified as high severity. There's a new inconvenient guest in data centers around the world. It's called CVE-2025-53506 and it doesn't...

Facebook Linkedin X

Magnus Carlsen beats ChatGPT at chess without losing a piece!

- July 17th, 2025

Magnus Carlsen beat ChatGPT at chess without losing a single piece, while his virtual opponent lost all his pawns. The Norwegian grandmaster posted screenshots of the game on the social...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE