Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The Russian Federation’s Roskomnadzor has announced that it continues to impose systematic restrictions on the messaging app WhatsApp due to violations of Russian law. According to the agency, the s...

The Shai-Hulud worm has spread beyond the npm ecosystem and was discovered in Maven . Socket specialists noticed an infected package on Maven Central containing the same malicious components used in t...

Artificial intelligence is currently capable of performing work equivalent to 11.7% of US employment . And not just in theory: in terms of monetary value, this value is already comparable to the salar...

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...
Attacks on Artificial Intelligence: Adversarial Attacks and Data Poisoning.
AI Agents: The Intelligent Revolution Explained to Everyone
RCE 0day Exploit for WinRAR and WinZIP for Sale on Exploit.in for Scam Phishing Emails
What was the first ransomware in history? Discovering Trojan AIDS
Creeper & Reaper: The story of the first worm and the first antivirus software.
Businesses are going bankrupt due to ransomware. Small and medium-sized businesses, beware!

Attacks on Artificial Intelligence: Adversarial Attacks and Data Poisoning.
Redazione RHC - July 9th, 2025
It's not hard to tell that the images below show three different things: a bird, a dog, and a horse. But to a machine learning algorithm, all three might look...

AI Agents: The Intelligent Revolution Explained to Everyone
Redazione RHC - July 9th, 2025
Imagine a digital assistant who not only answers your questions, but also acts for you, plans strategies, learns from its mistakes, and collaborates with others to solve complex problems. This...

RCE 0day Exploit for WinRAR and WinZIP for Sale on Exploit.in for Scam Phishing Emails
Redazione RHC - July 9th, 2025
Recently, the popular underground forum exploit.in, currently closed and accessible by invitation only, has been offering exploits for a 0day vulnerability affecting the well-known WinRAR and WinZIP programs. The ad,...

What was the first ransomware in history? Discovering Trojan AIDS
Redazione RHC - July 8th, 2025
We often talk about ransomware on Red Hot Cyber and criminal cyber gangs. But who invented this dangerous cyber blackmail "weapon"? Today, ransomware attacks have become familiar to most people,...

Creeper & Reaper: The story of the first worm and the first antivirus software.
Redazione RHC - July 8th, 2025
It's not uncommon to find references to information technology innovations in video games. Ada Lovelace (the first programmer in history), gave her name to the robot in Folsom 4, but...

Businesses are going bankrupt due to ransomware. Small and medium-sized businesses, beware!
Redazione RHC - July 8th, 2025
Very often on RHC, we talk about cyber attacks and ransomware. But this time, we want to go further. We want to talk about the companies that didn't make it,...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

