Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
LECS 320x100 1
970x120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
WhatsApp Blocked in Russia: Messaging App Faces Crackdown
Di Redazione RHC - 28/11/2025

The Russian Federation’s Roskomnadzor has announced that it continues to impose systematic restrictions on the messaging app WhatsApp due to violations of Russian law. According to the agency, the s...

Immagine del sito
Shai-Hulud Worm Spreads Beyond npm, Attacks Maven
Di Redazione RHC - 28/11/2025

The Shai-Hulud worm has spread beyond the npm ecosystem and was discovered in Maven . Socket specialists noticed an infected package on Maven Central containing the same malicious components used in t...

Immagine del sito
11.7% of jobs could be replaced by artificial intelligence
Di Redazione RHC - 28/11/2025

Artificial intelligence is currently capable of performing work equivalent to 11.7% of US employment . And not just in theory: in terms of monetary value, this value is already comparable to the salar...

Immagine del sito
Tor Boosts Security with Counter Galois Onion CGO Encryption
Di Redazione RHC - 27/11/2025

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

Immagine del sito
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Di Redazione RHC - 26/11/2025

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Attacks on Artificial Intelligence: Adversarial Attacks and Data Poisoning.

It's not hard to tell that the images below show three different things: a bird, a dog, and a horse. But to a machine learning algorithm, all three mi...
Redazione RHC - 10/07/2025 - 08:29

AI Agents: The Intelligent Revolution Explained to Everyone

Imagine a digital assistant who not only answers your questions, but also acts for you, plans strategies, learns from its mistakes, and collaborates w...
Redazione RHC - 10/07/2025 - 08:09

RCE 0day Exploit for WinRAR and WinZIP for Sale on Exploit.in for Scam Phishing Emails

Recently, the popular underground forum exploit.in, currently closed and accessible by invitation only, has been offering exploits for a 0day vulnerab...
Redazione RHC - 10/07/2025 - 07:48

What was the first ransomware in history? Discovering Trojan AIDS

We often talk about ransomware on Red Hot Cyber and criminal cyber gangs. But who invented this dangerous cyber blackmail "weapon"? Today, ransomwa...
Redazione RHC - 09/07/2025 - 11:49

Creeper & Reaper: The story of the first worm and the first antivirus software.

It's not uncommon to find references to information technology innovations in video games. Ada Lovelace (the first programmer in history), gave he...
Redazione RHC - 09/07/2025 - 11:31

Businesses are going bankrupt due to ransomware. Small and medium-sized businesses, beware!

Very often on RHC, we talk about cyber attacks and ransomware. But this time, we want to go further. We want to talk about the companies that didn...
Redazione RHC - 09/07/2025 - 11:16

Attacks on Artificial Intelligence: Adversarial Attacks and Data Poisoning.

- July 9th, 2025

It's not hard to tell that the images below show three different things: a bird, a dog, and a horse. But to a machine learning algorithm, all three might look...

Facebook Linkedin X

AI Agents: The Intelligent Revolution Explained to Everyone

- July 9th, 2025

Imagine a digital assistant who not only answers your questions, but also acts for you, plans strategies, learns from its mistakes, and collaborates with others to solve complex problems. This...

Facebook Linkedin X

RCE 0day Exploit for WinRAR and WinZIP for Sale on Exploit.in for Scam Phishing Emails

- July 9th, 2025

Recently, the popular underground forum exploit.in, currently closed and accessible by invitation only, has been offering exploits for a 0day vulnerability affecting the well-known WinRAR and WinZIP programs. The ad,...

Facebook Linkedin X

What was the first ransomware in history? Discovering Trojan AIDS

- July 8th, 2025

We often talk about ransomware on Red Hot Cyber and criminal cyber gangs. But who invented this dangerous cyber blackmail "weapon"? Today, ransomware attacks have become familiar to most people,...

Facebook Linkedin X

Creeper & Reaper: The story of the first worm and the first antivirus software.

- July 8th, 2025

It's not uncommon to find references to information technology innovations in video games. Ada Lovelace (the first programmer in history), gave her name to the robot in Folsom 4, but...

Facebook Linkedin X

Businesses are going bankrupt due to ransomware. Small and medium-sized businesses, beware!

- July 8th, 2025

Very often on RHC, we talk about cyber attacks and ransomware. But this time, we want to go further. We want to talk about the companies that didn't make it,...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE