Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Redhotcyber Banner Sito 320x100px Uscita 101125
UtiliaCS 970x120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
WhatsApp Blocked in Russia: Messaging App Faces Crackdown
Di Redazione RHC - 28/11/2025

The Russian Federation’s Roskomnadzor has announced that it continues to impose systematic restrictions on the messaging app WhatsApp due to violations of Russian law. According to the agency, the s...

Immagine del sito
Shai-Hulud Worm Spreads Beyond npm, Attacks Maven
Di Redazione RHC - 28/11/2025

The Shai-Hulud worm has spread beyond the npm ecosystem and was discovered in Maven . Socket specialists noticed an infected package on Maven Central containing the same malicious components used in t...

Immagine del sito
11.7% of jobs could be replaced by artificial intelligence
Di Redazione RHC - 28/11/2025

Artificial intelligence is currently capable of performing work equivalent to 11.7% of US employment . And not just in theory: in terms of monetary value, this value is already comparable to the salar...

Immagine del sito
Tor Boosts Security with Counter Galois Onion CGO Encryption
Di Redazione RHC - 27/11/2025

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

Immagine del sito
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Di Redazione RHC - 26/11/2025

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

What is an Advanced Persistent Threat (APT). A journey through malicious actors and state-sponsored hackers.

Advanced Persistent Threats (APTs) are malicious actors that operate in the shadows of the internet, conducting highly sophisticated and targeted atta...
Redazione RHC - 16/07/2025 - 09:58

What are Distributed Denial of Service (DDoS) attacks and how can we protect ourselves from them?

Distributed Denial of Service (DDoS) attacks are one of the most common threats to websites, servers, and other online infrastructure. Specifically, t...
Redazione RHC - 16/07/2025 - 09:56

The Inconvenient Truth About Work and AI: 99% Fight, 1% Win

On July 11, local time, it was revealed that Google DeepMind had successfully "recruited" the core team of AI startup Windsurf. Not long before, OpenA...
Redazione RHC - 16/07/2025 - 09:54

Hackers use ClickFix and FileFix to spread the Interlock Trojan

The Interlock ransomware hacker group is distributing a remote access trojan (RAT) through compromised websites. Hackers use FileFix attacks to spread...
Redazione RHC - 16/07/2025 - 08:19

Discovering Scattered Spider: The Criminal Threat Using Advanced Tactics and Techniques

By Cyber Defense Center Maticmind (Andrea Mariucci, Riccardo Michetti, Federico Savastano, Ada Spinelli) The Scattered Spider threat actor, UNC9344...
Redazione RHC - 16/07/2025 - 07:26

China calls for ethical and legal review of military humanoid robots

China has called for an urgent ethical and legal review of the military's use of humanoid robots, the South China Morning Post reports, citing the Chi...
Redazione RHC - 16/07/2025 - 07:13

Misteriosi APT nell'ombra digitale: Un'immersione profonda nelle minacce cibernetiche altamente sofisticate. Scopri chi sono, cosa li muove e come proteggerti in questo viaggio attraverso il mondo delle Advanced Persistent Threat (APT)

What is an Advanced Persistent Threat (APT). A journey through malicious actors and state-sponsored hackers.

- July 15th, 2025

Advanced Persistent Threats (APTs) are malicious actors that operate in the shadows of the internet, conducting highly sophisticated and targeted attacks. These groups, often associated with nation-states, pose a significant...

Facebook Linkedin X

What are Distributed Denial of Service (DDoS) attacks and how can we protect ourselves from them?

- July 15th, 2025

Distributed Denial of Service (DDoS) attacks are one of the most common threats to websites, servers, and other online infrastructure. Specifically, this type of attack attempts to overwhelm target servers...

Facebook Linkedin X

The Inconvenient Truth About Work and AI: 99% Fight, 1% Win

- July 15th, 2025

On July 11, local time, it was revealed that Google DeepMind had successfully "recruited" the core team of AI startup Windsurf. Not long before, OpenAI was negotiating a $3 billion...

Facebook Linkedin X

Hackers use ClickFix and FileFix to spread the Interlock Trojan

- July 15th, 2025

The Interlock ransomware hacker group is distributing a remote access trojan (RAT) through compromised websites. Hackers use FileFix attacks to spread the malware. ClickFix attacks rely on social engineering. Several...

Facebook Linkedin X

Discovering Scattered Spider: The Criminal Threat Using Advanced Tactics and Techniques

- July 15th, 2025

By Cyber Defense Center Maticmind (Andrea Mariucci, Riccardo Michetti, Federico Savastano, Ada Spinelli) The Scattered Spider threat actor, UNC9344, made its appearance in 2022 with two targeted attacks on Caesars...

Facebook Linkedin X

China calls for ethical and legal review of military humanoid robots

- July 15th, 2025

China has called for an urgent ethical and legal review of the military's use of humanoid robots, the South China Morning Post reports, citing the Chinese military's official newspaper, the...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE