Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The Russian Federation’s Roskomnadzor has announced that it continues to impose systematic restrictions on the messaging app WhatsApp due to violations of Russian law. According to the agency, the s...

The Shai-Hulud worm has spread beyond the npm ecosystem and was discovered in Maven . Socket specialists noticed an infected package on Maven Central containing the same malicious components used in t...

Artificial intelligence is currently capable of performing work equivalent to 11.7% of US employment . And not just in theory: in terms of monetary value, this value is already comparable to the salar...

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...
Live Ransomware Attack Video! HackerHood’s Workshop for Omnia and WithSecure
Google Chrome emergency fix for critical bug that leads to sandbox escape
Inside Operation Eastwood: The Shadows of Cyberterrorism and Propaganda
More and more malware is hiding in DNS records. The new frontier is also for AI.
The Computer Science degree is changing! 18 months to rewrite your resume.
The new version of the Konfety malware uses advanced evasion techniques

Live Ransomware Attack Video! HackerHood’s Workshop for Omnia and WithSecure
Redazione RHC - July 16th, 2025
HackerHood, Red Hot Cyber's team of ethical hackers, has created something rarely seen outside of the most exclusive conferences: a live workshop demonstrating, step by step, a complete ransomware attack....

Google Chrome emergency fix for critical bug that leads to sandbox escape
Redazione RHC - July 16th, 2025
Google has released an emergency update for the Chrome browser, simultaneously eliminating six vulnerabilities, one of which is already actively exploited in real-world attacks. The issue affects critical components associated...

Inside Operation Eastwood: The Shadows of Cyberterrorism and Propaganda
Redazione RHC - July 16th, 2025
The international "Eastwood" operation represents a watershed moment in the fight against cyberterrorism. For the first time, a coordinated global operation has dealt a severe blow to one of the...

More and more malware is hiding in DNS records. The new frontier is also for AI.
Redazione RHC - July 16th, 2025
Hackers have learned to hide malware in places where it is virtually impossible to trace: in DNS records that connect domain names to IP addresses. This technique allows them to...

The Computer Science degree is changing! 18 months to rewrite your resume.
Redazione RHC - July 16th, 2025
With the unstoppable advance of artificial intelligence in the education system, American colleges and universities are profoundly rethinking computer science courses. The goal? To promote not only AI literacy, but...

The new version of the Konfety malware uses advanced evasion techniques
Redazione RHC - July 16th, 2025
A new version of the Android malware called Konfety has become even more sophisticated: specialists at Zimperium zLabs have discovered an improved variant that uses non-standard ZIP archives and loads...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

