Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Redhotcyber Banner Sito 320x100px Uscita 101125
UtiliaCS 970x120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
WhatsApp Blocked in Russia: Messaging App Faces Crackdown
Di Redazione RHC - 28/11/2025

The Russian Federation’s Roskomnadzor has announced that it continues to impose systematic restrictions on the messaging app WhatsApp due to violations of Russian law. According to the agency, the s...

Immagine del sito
Shai-Hulud Worm Spreads Beyond npm, Attacks Maven
Di Redazione RHC - 28/11/2025

The Shai-Hulud worm has spread beyond the npm ecosystem and was discovered in Maven . Socket specialists noticed an infected package on Maven Central containing the same malicious components used in t...

Immagine del sito
11.7% of jobs could be replaced by artificial intelligence
Di Redazione RHC - 28/11/2025

Artificial intelligence is currently capable of performing work equivalent to 11.7% of US employment . And not just in theory: in terms of monetary value, this value is already comparable to the salar...

Immagine del sito
Tor Boosts Security with Counter Galois Onion CGO Encryption
Di Redazione RHC - 27/11/2025

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

Immagine del sito
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Di Redazione RHC - 26/11/2025

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Pig Butchering Scam: How Pig Slaughter Is Becoming an Emotional Addiction Scam

In the interconnected labyrinth of the 21st century, where the desire for authenticity and the search for opportunity dance on the edge of paradox, a ...
Redazione RHC - 08/07/2025 - 09:17

A new Poc Exploit allows Privilege Excalation on Linux using the udisksd daemon

A proof-of-concept (PoC) exploit for a critical vulnerability that allows local privilege escalation has been developed, affecting several major Linux...
Redazione RHC - 08/07/2025 - 09:16

Critical Vulnerabilities in SMBClient for macOS. 9.8 out of 10 for Effective RCE

Experts have identified serious vulnerabilities in SMBClient for macOS that affect both user space and the operating system kernel. These vulnerabilit...
Redazione RHC - 08/07/2025 - 09:15

Discovering Drumrlu. The IaB that does big business between Türkiye and Venezuela

After the Far East and Iran, we continue our series of articles on IAB actors with an actor believed to be based in Europe, in a NATO country. Orig...
Redazione RHC - 08/07/2025 - 09:12

Human Replatforming! Artificial Intelligence Threatens Half of Jobs

The chairman of the American car company Ford, Jim Farley, has released a statement sharp on the future of the job market in the age of artificial int...
Redazione RHC - 08/07/2025 - 09:11

123 Stealer is coming! $120 a month subscription to steal any confidential data

A new infostealer emerges from the criminal underground and its name is "123 | Stealer". The author of this software is a hacker who hides under the p...
Redazione RHC - 07/07/2025 - 07:53

Pig Butchering Scam: How Pig Slaughter Is Becoming an Emotional Addiction Scam

- July 7th, 2025

In the interconnected labyrinth of the 21st century, where the desire for authenticity and the search for opportunity dance on the edge of paradox, a dark phenomenon emerges that challenges...

Facebook Linkedin X

A new Poc Exploit allows Privilege Excalation on Linux using the udisksd daemon

- July 7th, 2025

A proof-of-concept (PoC) exploit for a critical vulnerability that allows local privilege escalation has been developed, affecting several major Linux distributions, such as Fedora and SUSE. The vulnerability, tracked as...

Facebook Linkedin X

Critical Vulnerabilities in SMBClient for macOS. 9.8 out of 10 for Effective RCE

- July 7th, 2025

Experts have identified serious vulnerabilities in SMBClient for macOS that affect both user space and the operating system kernel. These vulnerabilities potentially allow remote execution of arbitrary code and disruption...

Facebook Linkedin X

Discovering Drumrlu. The IaB that does big business between Türkiye and Venezuela

- July 7th, 2025

After the Far East and Iran, we continue our series of articles on IAB actors with an actor believed to be based in Europe, in a NATO country. Origin and...

Facebook Linkedin X

Human Replatforming! Artificial Intelligence Threatens Half of Jobs

- July 7th, 2025

The chairman of the American car company Ford, Jim Farley, has released a statement sharp on the future of the job market in the age of artificial intelligence. According to...

Facebook Linkedin X

123 Stealer is coming! $120 a month subscription to steal any confidential data

- July 6th, 2025

A new infostealer emerges from the criminal underground and its name is "123 | Stealer". The author of this software is a hacker who hides under the pseudonym koneko. He...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE