Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The Russian Federation’s Roskomnadzor has announced that it continues to impose systematic restrictions on the messaging app WhatsApp due to violations of Russian law. According to the agency, the s...

The Shai-Hulud worm has spread beyond the npm ecosystem and was discovered in Maven . Socket specialists noticed an infected package on Maven Central containing the same malicious components used in t...

Artificial intelligence is currently capable of performing work equivalent to 11.7% of US employment . And not just in theory: in terms of monetary value, this value is already comparable to the salar...

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...
Xlibre and Wayback: Two Linux Projects Clash Over X.org’s Legacy
A study shows a shocking truth: 98.5% of passwords are weak!
Operation Eastwood: Pro-Russian hacker group NoName057(16) dismantled
What is Doxing and How Can It Change Your Online Life?
What are Botnets? A Journey Through Malware, Cyber Threat Intelligence, and OSINT
Cloudflare: DDoS attacks decline in Q2 2025, but extreme attacks increase

Xlibre and Wayback: Two Linux Projects Clash Over X.org’s Legacy
Redazione RHC - July 16th, 2025
The Linux ecosystem is once again in the spotlight, with a fork of the good old X.org taking center stage. The new project, called Xlibre, was launched by German developer...

A study shows a shocking truth: 98.5% of passwords are weak!
Redazione RHC - July 15th, 2025
In a new analysis based on 10 million compromised passwords, Specops has demonstrated how vulnerable corporate networks remain to human error. All passwords were extracted from a list of over...

Operation Eastwood: Pro-Russian hacker group NoName057(16) dismantled
Redazione RHC - July 15th, 2025
As part of the investigations conducted by the Rome Public Prosecutor's Office and coordinated by the National Anti-Mafia and Anti-Terrorism Directorate, the Postal Police has completed important investigative activities in...

What is Doxing and How Can It Change Your Online Life?
Redazione RHC - July 15th, 2025
Doxing (short for "dropping dox," sometimes written as Doxxing) is the act of revealing personal information about someone online, such as their real name, home address, workplace, phone number, financial...

What are Botnets? A Journey Through Malware, Cyber Threat Intelligence, and OSINT
Redazione RHC - July 15th, 2025
The Internet provides a sea of information. We often talk on RHC about Open Source Intelligence (OSINT) and Cyber Threat Intelligence (CTI), i.e. those intelligence disciplines that deal with the...

Cloudflare: DDoS attacks decline in Q2 2025, but extreme attacks increase
Redazione RHC - July 15th, 2025
Cloudflare recorded a sharp decline in DDoS attacks in the second quarter of 2025, blocking 7.3 million attacks, compared to the 20.5 million reported in the first quarter. Despite the...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

