Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The Russian Federation’s Roskomnadzor has announced that it continues to impose systematic restrictions on the messaging app WhatsApp due to violations of Russian law. According to the agency, the s...

The Shai-Hulud worm has spread beyond the npm ecosystem and was discovered in Maven . Socket specialists noticed an infected package on Maven Central containing the same malicious components used in t...

Artificial intelligence is currently capable of performing work equivalent to 11.7% of US employment . And not just in theory: in terms of monetary value, this value is already comparable to the salar...

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...
Discovering LLM Firewalls: The New Frontier in Adaptive Cyber Security
The biggest threat from AI? Young people won’t be able to think anymore!
What is phishing? Let’s avoid falling for the hack-fisherman’s bait.
What are supply chain attacks? A more concrete threat than ever.
I use macOS because it’s secure! Atomic Stealer: €1,000 per month with backdoor features
Commodore 64: The return of the best-selling retro computer of all time is now

Discovering LLM Firewalls: The New Frontier in Adaptive Cyber Security
Redazione RHC - July 13th, 2025
Over the past 3 years, generative AI, particularly large language models (LLMs), have revolutionized the way we interact with machines, allowing us to obtain increasingly natural and contextualized responses. However,...

The biggest threat from AI? Young people won’t be able to think anymore!
Redazione RHC - July 13th, 2025
"Now that the genie is out of the bottle, it's impossible to put it back!". How many times have we written these words about artificial intelligence? Now that the genie...

What is phishing? Let’s avoid falling for the hack-fisherman’s bait.
Redazione RHC - July 13th, 2025
With the increase in ransomware attacks—often launched via phishing emails—it's crucial to be proactive in protecting yourself and the organization you work for. Certainly, having computers and servers that are...

What are supply chain attacks? A more concrete threat than ever.
Redazione RHC - July 13th, 2025
As businesses become increasingly dependent on technology, connectivity, and third parties in general, supply chain attacks are becoming increasingly common. These attacks are aimed at compromising companies through their suppliers...

I use macOS because it’s secure! Atomic Stealer: €1,000 per month with backdoor features
Redazione RHC - July 13th, 2025
Researchers have discovered a new version of the Atomic Stealer malware for macOS (also known as AMOS). The malware now has a backdoor that allows access to hacked systems. MacPaw...

Commodore 64: The return of the best-selling retro computer of all time is now
Redazione RHC - July 12th, 2025
The record for best-selling desktop computer of all time is still held by the Commodore 64, as certified by the Guinness Book of Records, despite its discontinuation in 1994. However,...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

