Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The Russian Federation’s Roskomnadzor has announced that it continues to impose systematic restrictions on the messaging app WhatsApp due to violations of Russian law. According to the agency, the s...

The Shai-Hulud worm has spread beyond the npm ecosystem and was discovered in Maven . Socket specialists noticed an infected package on Maven Central containing the same malicious components used in t...

Artificial intelligence is currently capable of performing work equivalent to 11.7% of US employment . And not just in theory: in terms of monetary value, this value is already comparable to the salar...

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...
What is an Advanced Persistent Threat (APT). A journey through malicious actors and state-sponsored hackers.
What are Distributed Denial of Service (DDoS) attacks and how can we protect ourselves from them?
The Inconvenient Truth About Work and AI: 99% Fight, 1% Win
Hackers use ClickFix and FileFix to spread the Interlock Trojan
Discovering Scattered Spider: The Criminal Threat Using Advanced Tactics and Techniques
China calls for ethical and legal review of military humanoid robots

What is an Advanced Persistent Threat (APT). A journey through malicious actors and state-sponsored hackers.
Redazione RHC - July 15th, 2025
Advanced Persistent Threats (APTs) are malicious actors that operate in the shadows of the internet, conducting highly sophisticated and targeted attacks. These groups, often associated with nation-states, pose a significant...

What are Distributed Denial of Service (DDoS) attacks and how can we protect ourselves from them?
Redazione RHC - July 15th, 2025
Distributed Denial of Service (DDoS) attacks are one of the most common threats to websites, servers, and other online infrastructure. Specifically, this type of attack attempts to overwhelm target servers...

The Inconvenient Truth About Work and AI: 99% Fight, 1% Win
Redazione RHC - July 15th, 2025
On July 11, local time, it was revealed that Google DeepMind had successfully "recruited" the core team of AI startup Windsurf. Not long before, OpenAI was negotiating a $3 billion...

Hackers use ClickFix and FileFix to spread the Interlock Trojan
Redazione RHC - July 15th, 2025
The Interlock ransomware hacker group is distributing a remote access trojan (RAT) through compromised websites. Hackers use FileFix attacks to spread the malware. ClickFix attacks rely on social engineering. Several...

Discovering Scattered Spider: The Criminal Threat Using Advanced Tactics and Techniques
Redazione RHC - July 15th, 2025
By Cyber Defense Center Maticmind (Andrea Mariucci, Riccardo Michetti, Federico Savastano, Ada Spinelli) The Scattered Spider threat actor, UNC9344, made its appearance in 2022 with two targeted attacks on Caesars...

China calls for ethical and legal review of military humanoid robots
Redazione RHC - July 15th, 2025
China has called for an urgent ethical and legal review of the military's use of humanoid robots, the South China Morning Post reports, citing the Chinese military's official newspaper, the...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

