Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
2nd Edition GlitchZone RHC 320x100 2
Redhotcyber Banner Sito 970x120px Uscita 101125

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
WhatsApp Blocked in Russia: Messaging App Faces Crackdown
Di Redazione RHC - 28/11/2025

The Russian Federation’s Roskomnadzor has announced that it continues to impose systematic restrictions on the messaging app WhatsApp due to violations of Russian law. According to the agency, the s...

Immagine del sito
Shai-Hulud Worm Spreads Beyond npm, Attacks Maven
Di Redazione RHC - 28/11/2025

The Shai-Hulud worm has spread beyond the npm ecosystem and was discovered in Maven . Socket specialists noticed an infected package on Maven Central containing the same malicious components used in t...

Immagine del sito
11.7% of jobs could be replaced by artificial intelligence
Di Redazione RHC - 28/11/2025

Artificial intelligence is currently capable of performing work equivalent to 11.7% of US employment . And not just in theory: in terms of monetary value, this value is already comparable to the salar...

Immagine del sito
Tor Boosts Security with Counter Galois Onion CGO Encryption
Di Redazione RHC - 27/11/2025

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

Immagine del sito
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Di Redazione RHC - 26/11/2025

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Discovering LLM Firewalls: The New Frontier in Adaptive Cyber Security

Over the past 3 years, generative AI, particularly large language models (LLMs), have revolutionized the way we interact with machines, allowing us to...
Redazione RHC - 14/07/2025 - 10:21

The biggest threat from AI? Young people won’t be able to think anymore!

"Now that the genie is out of the bottle, it's impossible to put it back!". How many times have we written these words about artificial intelligence? ...
Redazione RHC - 14/07/2025 - 08:13

What is phishing? Let’s avoid falling for the hack-fisherman’s bait.

With the increase in ransomware attacks—often launched via phishing emails—it's crucial to be proactive in protecting yourself and the organization yo...
Redazione RHC - 14/07/2025 - 07:29

What are supply chain attacks? A more concrete threat than ever.

As businesses become increasingly dependent on technology, connectivity, and third parties in general, supply chain attacks are becoming increasingly ...
Redazione RHC - 14/07/2025 - 07:26

I use macOS because it’s secure! Atomic Stealer: €1,000 per month with backdoor features

Researchers have discovered a new version of the Atomic Stealer malware for macOS (also known as AMOS). The malware now has a backdoor that allows acc...
Redazione RHC - 14/07/2025 - 07:02

Commodore 64: The return of the best-selling retro computer of all time is now

The record for best-selling desktop computer of all time is still held by the Commodore 64, as certified by the Guinness Book of Records, despite its ...
Redazione RHC - 13/07/2025 - 16:25

Discovering LLM Firewalls: The New Frontier in Adaptive Cyber Security

- July 13th, 2025

Over the past 3 years, generative AI, particularly large language models (LLMs), have revolutionized the way we interact with machines, allowing us to obtain increasingly natural and contextualized responses. However,...

Facebook Linkedin X

The biggest threat from AI? Young people won’t be able to think anymore!

- July 13th, 2025

"Now that the genie is out of the bottle, it's impossible to put it back!". How many times have we written these words about artificial intelligence? Now that the genie...

Facebook Linkedin X

What is phishing? Let’s avoid falling for the hack-fisherman’s bait.

- July 13th, 2025

With the increase in ransomware attacks—often launched via phishing emails—it's crucial to be proactive in protecting yourself and the organization you work for. Certainly, having computers and servers that are...

Facebook Linkedin X

What are supply chain attacks? A more concrete threat than ever.

- July 13th, 2025

As businesses become increasingly dependent on technology, connectivity, and third parties in general, supply chain attacks are becoming increasingly common. These attacks are aimed at compromising companies through their suppliers...

Facebook Linkedin X

I use macOS because it’s secure! Atomic Stealer: €1,000 per month with backdoor features

- July 13th, 2025

Researchers have discovered a new version of the Atomic Stealer malware for macOS (also known as AMOS). The malware now has a backdoor that allows access to hacked systems. MacPaw...

Facebook Linkedin X

Commodore 64: The return of the best-selling retro computer of all time is now

- July 12th, 2025

The record for best-selling desktop computer of all time is still held by the Commodore 64, as certified by the Guinness Book of Records, despite its discontinuation in 1994. However,...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE