Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Banner Ancharia Mobile 1
Banner Ransomfeed 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
WhatsApp Blocked in Russia: Messaging App Faces Crackdown
Di Redazione RHC - 28/11/2025

The Russian Federation’s Roskomnadzor has announced that it continues to impose systematic restrictions on the messaging app WhatsApp due to violations of Russian law. According to the agency, the s...

Immagine del sito
Shai-Hulud Worm Spreads Beyond npm, Attacks Maven
Di Redazione RHC - 28/11/2025

The Shai-Hulud worm has spread beyond the npm ecosystem and was discovered in Maven . Socket specialists noticed an infected package on Maven Central containing the same malicious components used in t...

Immagine del sito
11.7% of jobs could be replaced by artificial intelligence
Di Redazione RHC - 28/11/2025

Artificial intelligence is currently capable of performing work equivalent to 11.7% of US employment . And not just in theory: in terms of monetary value, this value is already comparable to the salar...

Immagine del sito
Tor Boosts Security with Counter Galois Onion CGO Encryption
Di Redazione RHC - 27/11/2025

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

Immagine del sito
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Di Redazione RHC - 26/11/2025

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

What is ransomware? Let’s explore how RaaS works and what it means.

Many people often want to understand the ransomware phenomenon precisely, its meaning, the methods of violation, and the crime that revolves around it...
Redazione RHC - 09/07/2025 - 11:12

The Shellter Elite suite used by Red Teams to bypass EDRs is now being used by cybercrime

Shellter Project, maker of a commercial downloader for bypassing antivirus and EDR systems, has reported that hackers are using its Shellter Elite pro...
Redazione RHC - 09/07/2025 - 10:50

Is the end of state-led cyberspace invasions coming? The 56-page draft prepared by the UN

The eleventh final session of the Open-Ended Working Group (OEWG) on cybersecurity opened at the United Nations Headquarters in New York on July 7. Th...
Redazione RHC - 09/07/2025 - 10:50

Claude Shannon: Father of Cryptography and Founder of the Information Age

Whoever has as a mission, to deal with computer security and therefore also with cryptography, must necessarily pass through the figures of two giant...
Carlo Denza - 08/07/2025 - 09:28

Who are the most famous hackers in history?

We often talk about hackers, but who are the famous hackers that ever existed? Considered by many as eccentric geniuses and computer wizards, by ot...
Redazione RHC - 08/07/2025 - 09:21

Underwater cables and the “cyber war of the seabed”. Between control, geopolitics and technology

Author: 5ar0m4n Publishing Date: 11/7/2021 We have often addressed the topic of undersea cables on RHC where we talked about the first submarine cabl...
Redazione RHC - 08/07/2025 - 09:20

What is ransomware? Let’s explore how RaaS works and what it means.

- July 8th, 2025

Many people often want to understand the ransomware phenomenon precisely, its meaning, the methods of violation, and the crime that revolves around it, struggling to find information scattered across thousands...

Facebook Linkedin X

The Shellter Elite suite used by Red Teams to bypass EDRs is now being used by cybercrime

- July 8th, 2025

Shellter Project, maker of a commercial downloader for bypassing antivirus and EDR systems, has reported that hackers are using its Shellter Elite product for attacks. This is because one of...

Facebook Linkedin X

Is the end of state-led cyberspace invasions coming? The 56-page draft prepared by the UN

- July 8th, 2025

The eleventh final session of the Open-Ended Working Group (OEWG) on cybersecurity opened at the United Nations Headquarters in New York on July 7. The group was created in 2019...

Facebook Linkedin X

Claude Shannon: Father of Cryptography and Founder of the Information Age

- July 7th, 2025

Whoever has as a mission, to deal with computer security and therefore also with cryptography, must necessarily pass through the figures of two giants of the last century. We are...

Facebook Linkedin X

Who are the most famous hackers in history?

- July 7th, 2025

We often talk about hackers, but who are the famous hackers that ever existed? Considered by many as eccentric geniuses and computer wizards, by others they have the appearance of...

Facebook Linkedin X

Underwater cables and the “cyber war of the seabed”. Between control, geopolitics and technology

- July 7th, 2025

Author: 5ar0m4n Publishing Date: 11/7/2021 We have often addressed the topic of undersea cables on RHC where we talked about the first submarine cable in history and the last one...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE