Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Banner Ransomfeed 320x100 1
970x20 Itcentric

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
WhatsApp Blocked in Russia: Messaging App Faces Crackdown
Di Redazione RHC - 28/11/2025

The Russian Federation’s Roskomnadzor has announced that it continues to impose systematic restrictions on the messaging app WhatsApp due to violations of Russian law. According to the agency, the s...

Immagine del sito
Shai-Hulud Worm Spreads Beyond npm, Attacks Maven
Di Redazione RHC - 28/11/2025

The Shai-Hulud worm has spread beyond the npm ecosystem and was discovered in Maven . Socket specialists noticed an infected package on Maven Central containing the same malicious components used in t...

Immagine del sito
11.7% of jobs could be replaced by artificial intelligence
Di Redazione RHC - 28/11/2025

Artificial intelligence is currently capable of performing work equivalent to 11.7% of US employment . And not just in theory: in terms of monetary value, this value is already comparable to the salar...

Immagine del sito
Tor Boosts Security with Counter Galois Onion CGO Encryption
Di Redazione RHC - 27/11/2025

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

Immagine del sito
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Di Redazione RHC - 26/11/2025

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Xlibre and Wayback: Two Linux Projects Clash Over X.org’s Legacy

The Linux ecosystem is once again in the spotlight, with a fork of the good old X.org taking center stage. The new project, called Xlibre, was launche...
Redazione RHC - 17/07/2025 - 08:10

A study shows a shocking truth: 98.5% of passwords are weak!

In a new analysis based on 10 million compromised passwords, Specops has demonstrated how vulnerable corporate networks remain to human error. All pas...
Redazione RHC - 16/07/2025 - 17:39

Operation Eastwood: Pro-Russian hacker group NoName057(16) dismantled

As part of the investigations conducted by the Rome Public Prosecutor's Office and coordinated by the National Anti-Mafia and Anti-Terrorism Directora...
Redazione RHC - 16/07/2025 - 14:31

What is Doxing and How Can It Change Your Online Life?

Doxing (short for "dropping dox," sometimes written as Doxxing) is the act of revealing personal information about someone online, such as their real ...
Redazione RHC - 16/07/2025 - 11:32

What are Botnets? A Journey Through Malware, Cyber Threat Intelligence, and OSINT

The Internet provides a sea of information. We often talk on RHC about Open Source Intelligence (OSINT) and Cyber Threat Intelligence (CTI), i.e. thos...
Redazione RHC - 16/07/2025 - 11:25

Cloudflare: DDoS attacks decline in Q2 2025, but extreme attacks increase

Cloudflare recorded a sharp decline in DDoS attacks in the second quarter of 2025, blocking 7.3 million attacks, compared to the 20.5 million reported...
Redazione RHC - 16/07/2025 - 10:59

Xlibre and Wayback: Two Linux Projects Clash Over X.org’s Legacy

- July 16th, 2025

The Linux ecosystem is once again in the spotlight, with a fork of the good old X.org taking center stage. The new project, called Xlibre, was launched by German developer...

Facebook Linkedin X

A study shows a shocking truth: 98.5% of passwords are weak!

- July 15th, 2025

In a new analysis based on 10 million compromised passwords, Specops has demonstrated how vulnerable corporate networks remain to human error. All passwords were extracted from a list of over...

Facebook Linkedin X

Operation Eastwood: Pro-Russian hacker group NoName057(16) dismantled

- July 15th, 2025

As part of the investigations conducted by the Rome Public Prosecutor's Office and coordinated by the National Anti-Mafia and Anti-Terrorism Directorate, the Postal Police has completed important investigative activities in...

Facebook Linkedin X

What is Doxing and How Can It Change Your Online Life?

- July 15th, 2025

Doxing (short for "dropping dox," sometimes written as Doxxing) is the act of revealing personal information about someone online, such as their real name, home address, workplace, phone number, financial...

Facebook Linkedin X

What are Botnets? A Journey Through Malware, Cyber Threat Intelligence, and OSINT

- July 15th, 2025

The Internet provides a sea of information. We often talk on RHC about Open Source Intelligence (OSINT) and Cyber Threat Intelligence (CTI), i.e. those intelligence disciplines that deal with the...

Facebook Linkedin X

Cloudflare: DDoS attacks decline in Q2 2025, but extreme attacks increase

- July 15th, 2025

Cloudflare recorded a sharp decline in DDoS attacks in the second quarter of 2025, blocking 7.3 million attacks, compared to the 20.5 million reported in the first quarter. Despite the...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE