Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
2nd Edition GlitchZone RHC 320x100 2
TM RedHotCyber 970x120 042543

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Tor Boosts Security with Counter Galois Onion CGO Encryption
Di Redazione RHC - 27/11/2025

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

Immagine del sito
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Di Redazione RHC - 26/11/2025

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Immagine del sito
Investment Scam Alert: How to Avoid Losing Thousands
Di Redazione RHC - 26/11/2025

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

Immagine del sito
Malware Uses Finger Command to Infect Windows Devices
Di Redazione RHC - 26/11/2025

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

Immagine del sito
The AGI Revolution: How Mark Gubrud’s Term Changed Tech Forever
Di Redazione RHC - 25/11/2025

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...

Top Malware: Flame, the modular “spy” malware targeting the Middle East.

Flame, (also known as Flamer, sKyWIper, Skywiper), is a modular computer malware discovered in 2012 that attacked Middle Eastern target computers runn...
Massimiliano Brolli - 12/11/2025 - 22:27

Slammer, the first worm to use a bug that hasn’t been fixed for six months.

Many years have passed since the SQL Slammer worm spread uncontrollably on January 25, 2003. It was one of the fastest-spreading malware in history , ...
Redazione RHC - 12/11/2025 - 22:24

The Story of the First Keylogger: How Hidden Keyboard Control Came to Be

We all know Bruce Schneier , a renowned cryptography and computer security expert, member of the board of directors of the International Association f...
Redazione RHC - 12/11/2025 - 22:19

A Brief History of Malware: The Evolution of the Species from Its Origins to the Present Day

At first we talked about “viruses” , then “worms” appeared, followed by “macro viruses”. These were soon joined by other types of hostile software suc...
Redazione RHC - 12/11/2025 - 22:17

What Are Large Language Models? Behind the Scenes of Artificial Intelligence

In the rapidly evolving world of artificial intelligence (AI), one term has emerged with increasing importance: Language Model, especially large langu...
Marcello Politi - 12/11/2025 - 22:11

Let’s discover the differences between a Machine Learning and Deep Learning algorithm

In the world of artificial intelligence, we often hear two terms: machine learning (ML) and deep learning (DL). Both are methods for implementing AI t...
Marcello Politi - 12/11/2025 - 22:08
1 20 21 22 23 24 256

Top Malware: Flame, the modular “spy” malware targeting the Middle East.

- November 11th, 2025

Flame, (also known as Flamer, sKyWIper, Skywiper), is a modular computer malware discovered in 2012 that attacked Middle Eastern target computers running the Microsoft Windows operating system. The program's primary...

Facebook Linkedin X

Slammer, the first worm to use a bug that hasn’t been fixed for six months.

- November 11th, 2025

Many years have passed since the SQL Slammer worm spread uncontrollably on January 25, 2003. It was one of the fastest-spreading malware in history , and with this article we...

Facebook Linkedin X

The Story of the First Keylogger: How Hidden Keyboard Control Came to Be

- November 11th, 2025

We all know Bruce Schneier , a renowned cryptography and computer security expert, member of the board of directors of the International Association for Cryptological Research and a renowned speaker,...

Facebook Linkedin X

A Brief History of Malware: The Evolution of the Species from Its Origins to the Present Day

- November 11th, 2025

At first we talked about “viruses” , then “worms” appeared, followed by “macro viruses”. These were soon joined by other types of hostile software such as keyloggers or lockers. At...

Facebook Linkedin X

What Are Large Language Models? Behind the Scenes of Artificial Intelligence

- November 11th, 2025

In the rapidly evolving world of artificial intelligence (AI), one term has emerged with increasing importance: Language Model, especially large language models, then called Large Language Models. You've likely already...

Facebook Linkedin X

Let’s discover the differences between a Machine Learning and Deep Learning algorithm

- November 11th, 2025

In the world of artificial intelligence, we often hear two terms: machine learning (ML) and deep learning (DL). Both are methods for implementing AI through the training of machine learning...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE