Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Redhotcyber Banner Sito 320x100px Uscita 101125
Banner Ransomfeed 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
WhatsApp Blocked in Russia: Messaging App Faces Crackdown
Di Redazione RHC - 28/11/2025

The Russian Federation’s Roskomnadzor has announced that it continues to impose systematic restrictions on the messaging app WhatsApp due to violations of Russian law. According to the agency, the s...

Immagine del sito
Shai-Hulud Worm Spreads Beyond npm, Attacks Maven
Di Redazione RHC - 28/11/2025

The Shai-Hulud worm has spread beyond the npm ecosystem and was discovered in Maven . Socket specialists noticed an infected package on Maven Central containing the same malicious components used in t...

Immagine del sito
11.7% of jobs could be replaced by artificial intelligence
Di Redazione RHC - 28/11/2025

Artificial intelligence is currently capable of performing work equivalent to 11.7% of US employment . And not just in theory: in terms of monetary value, this value is already comparable to the salar...

Immagine del sito
Tor Boosts Security with Counter Galois Onion CGO Encryption
Di Redazione RHC - 27/11/2025

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

Immagine del sito
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Di Redazione RHC - 26/11/2025

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Live Ransomware Attack Video! HackerHood’s Workshop for Omnia and WithSecure

HackerHood, Red Hot Cyber's team of ethical hackers, has created something rarely seen outside of the most exclusive conferences: a live workshop demo...
Redazione RHC - 17/07/2025 - 13:56

Google Chrome emergency fix for critical bug that leads to sandbox escape

Google has released an emergency update for the Chrome browser, simultaneously eliminating six vulnerabilities, one of which is already actively explo...
Redazione RHC - 17/07/2025 - 12:31

Inside Operation Eastwood: The Shadows of Cyberterrorism and Propaganda

The international "Eastwood" operation represents a watershed moment in the fight against cyberterrorism. For the first time, a coordinated global ope...
Redazione RHC - 17/07/2025 - 10:48

More and more malware is hiding in DNS records. The new frontier is also for AI.

Hackers have learned to hide malware in places where it is virtually impossible to trace: in DNS records that connect domain names to IP addresses. Th...
Redazione RHC - 17/07/2025 - 09:07

The Computer Science degree is changing! 18 months to rewrite your resume.

With the unstoppable advance of artificial intelligence in the education system, American colleges and universities are profoundly rethinking computer...
Redazione RHC - 17/07/2025 - 08:11

The new version of the Konfety malware uses advanced evasion techniques

A new version of the Android malware called Konfety has become even more sophisticated: specialists at Zimperium zLabs have discovered an improved var...
Redazione RHC - 17/07/2025 - 08:10

Live Ransomware Attack Video! HackerHood’s Workshop for Omnia and WithSecure

- July 16th, 2025

HackerHood, Red Hot Cyber's team of ethical hackers, has created something rarely seen outside of the most exclusive conferences: a live workshop demonstrating, step by step, a complete ransomware attack....

Facebook Linkedin X

Google Chrome emergency fix for critical bug that leads to sandbox escape

- July 16th, 2025

Google has released an emergency update for the Chrome browser, simultaneously eliminating six vulnerabilities, one of which is already actively exploited in real-world attacks. The issue affects critical components associated...

Facebook Linkedin X

Inside Operation Eastwood: The Shadows of Cyberterrorism and Propaganda

- July 16th, 2025

The international "Eastwood" operation represents a watershed moment in the fight against cyberterrorism. For the first time, a coordinated global operation has dealt a severe blow to one of the...

Facebook Linkedin X

More and more malware is hiding in DNS records. The new frontier is also for AI.

- July 16th, 2025

Hackers have learned to hide malware in places where it is virtually impossible to trace: in DNS records that connect domain names to IP addresses. This technique allows them to...

Facebook Linkedin X

The Computer Science degree is changing! 18 months to rewrite your resume.

- July 16th, 2025

With the unstoppable advance of artificial intelligence in the education system, American colleges and universities are profoundly rethinking computer science courses. The goal? To promote not only AI literacy, but...

Facebook Linkedin X

The new version of the Konfety malware uses advanced evasion techniques

- July 16th, 2025

A new version of the Android malware called Konfety has become even more sophisticated: specialists at Zimperium zLabs have discovered an improved variant that uses non-standard ZIP archives and loads...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE