Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
TM RedHotCyber 320x100 042514
970x120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
WhatsApp Blocked in Russia: Messaging App Faces Crackdown
Di Redazione RHC - 28/11/2025

The Russian Federation’s Roskomnadzor has announced that it continues to impose systematic restrictions on the messaging app WhatsApp due to violations of Russian law. According to the agency, the s...

Immagine del sito
Shai-Hulud Worm Spreads Beyond npm, Attacks Maven
Di Redazione RHC - 28/11/2025

The Shai-Hulud worm has spread beyond the npm ecosystem and was discovered in Maven . Socket specialists noticed an infected package on Maven Central containing the same malicious components used in t...

Immagine del sito
11.7% of jobs could be replaced by artificial intelligence
Di Redazione RHC - 28/11/2025

Artificial intelligence is currently capable of performing work equivalent to 11.7% of US employment . And not just in theory: in terms of monetary value, this value is already comparable to the salar...

Immagine del sito
Tor Boosts Security with Counter Galois Onion CGO Encryption
Di Redazione RHC - 27/11/2025

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

Immagine del sito
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Di Redazione RHC - 26/11/2025

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Breadcrumbing: Understanding Emotional Manipulation to Better Defend Yourself in the Digital Domain

This article aims to explore the phenomenon of breadcrumbing from a psychological perspective, metaphorically linking it to the insidious strategies t...
Redazione RHC - 23/06/2025 - 07:03

Connected and Vulnerable: How to Secure OT and ICS in 2025

In today's interconnected world, cybersecurity is not just about protecting information. Today, most devices and physical tools are connected to the n...
Redazione RHC - 22/06/2025 - 23:08

Darkcloux 3.0 is here: Securonis Linux becomes more secure (and more extreme) than ever

Securonis Linux has released its most significant update: version 3.0 of "Darkcloux" and the 3.0-r1 patch. The release includes new utilities, redesig...
Redazione RHC - 22/06/2025 - 23:07

Urobot watches you while you pee (but it’s for your own good)

A Taiwanese hospital is testing Urobot, a smart urinal that instantly analyzes urine and emails the results. Although the device is designed in a "cut...
Redazione RHC - 22/06/2025 - 22:29

Smart TV or Living Room Spies? Here’s How They’re Monitoring You

Many owners of smart TV operating systems are increasingly finding themselves caught in a conflict that rages between the desire to preserve viewer pr...
Redazione RHC - 22/06/2025 - 18:54

Massive Windows Crash: The OpenVPN Flaw That Can Knock Out Infrastructures

A critical vulnerability has been discovered in the OpenVPN data channel offload driver for Windows, which can be exploited by local attackers to cras...
Redazione RHC - 22/06/2025 - 18:54

Breadcrumbing: Understanding Emotional Manipulation to Better Defend Yourself in the Digital Domain

- June 22nd, 2025

This article aims to explore the phenomenon of breadcrumbing from a psychological perspective, metaphorically linking it to the insidious strategies that attackers use in cybersecurity. We will discover how understanding...

Facebook Linkedin X

Connected and Vulnerable: How to Secure OT and ICS in 2025

- June 21st, 2025

In today's interconnected world, cybersecurity is not just about protecting information. Today, most devices and physical tools are connected to the network in some way. Whether for its structural operation...

Facebook Linkedin X

Darkcloux 3.0 is here: Securonis Linux becomes more secure (and more extreme) than ever

- June 21st, 2025

Securonis Linux has released its most significant update: version 3.0 of "Darkcloux" and the 3.0-r1 patch. The release includes new utilities, redesigned components, and improvements to privacy and security. The main change...

Facebook Linkedin X

Urobot watches you while you pee (but it’s for your own good)

- June 21st, 2025

A Taiwanese hospital is testing Urobot, a smart urinal that instantly analyzes urine and emails the results. Although the device is designed in a "cute" style, social media users have...

Facebook Linkedin X

Smart TV or Living Room Spies? Here’s How They’re Monitoring You

- June 21st, 2025

Many owners of smart TV operating systems are increasingly finding themselves caught in a conflict that rages between the desire to preserve viewer privacy and pressure from the advertising industry....

Facebook Linkedin X

Massive Windows Crash: The OpenVPN Flaw That Can Knock Out Infrastructures

- June 21st, 2025

A critical vulnerability has been discovered in the OpenVPN data channel offload driver for Windows, which can be exploited by local attackers to crash systems. The bug, classified as CVE-2025-50054,...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE