Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
2nd Edition GlitchZone RHC 320x100 2
Banner Ransomfeed 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
WhatsApp Blocked in Russia: Messaging App Faces Crackdown
Di Redazione RHC - 28/11/2025

The Russian Federation’s Roskomnadzor has announced that it continues to impose systematic restrictions on the messaging app WhatsApp due to violations of Russian law. According to the agency, the s...

Immagine del sito
Shai-Hulud Worm Spreads Beyond npm, Attacks Maven
Di Redazione RHC - 28/11/2025

The Shai-Hulud worm has spread beyond the npm ecosystem and was discovered in Maven . Socket specialists noticed an infected package on Maven Central containing the same malicious components used in t...

Immagine del sito
11.7% of jobs could be replaced by artificial intelligence
Di Redazione RHC - 28/11/2025

Artificial intelligence is currently capable of performing work equivalent to 11.7% of US employment . And not just in theory: in terms of monetary value, this value is already comparable to the salar...

Immagine del sito
Tor Boosts Security with Counter Galois Onion CGO Encryption
Di Redazione RHC - 27/11/2025

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

Immagine del sito
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Di Redazione RHC - 26/11/2025

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Android Under Attack: Godfather Malware Now Uses Virtualization to Fool Everyone

A new version of Android malware Godfather has been discovered that creates isolated virtual environments on mobile devices to steal data from banking...
Redazione RHC - 22/06/2025 - 18:44

ChatGPT is Shutting Down Our Brains! Alarming MIT Research Shows Mental Decay

During a RHC Conference, Corrado Giustozzi underlined a truth as simple as it is powerful: “Human beings have always been creators of amplifiers.”. Fr...
Redazione RHC - 22/06/2025 - 18:38

AKIRA emergency report: the ransomware that is breaching Italy

Spring 2025 will be remembered as a turning point in our country's cyber chronicle. As bulletins and technical releases follow one another, one fact e...
RHC Dark Lab - 22/06/2025 - 17:48

RHC GhostSec interview: hacktivism in the shadows of terrorism and cyber conflict

Ghost Security, also known as GhostSec, is a hacktivist group which emerged in the context of the cyber war against Islamic extremism. The first actio...
RHC Dark Lab - 12/06/2025 - 08:33

Group-IB contributes to INTERPOL’s Operation Secure, leading to the arrest of 32 suspects linked to information stealer malware in Asia

[Singapore; 11 June, 2025] Group-IB, a leading creator of cybersecurity technologies to investigate, prevent, and fight digital crime, announced today...
Redazione RHC - 11/06/2025 - 12:37

RHC Interviews NOVA Ransomware – “Expect Dangerous Attacks. No One Is Safe.” | BLACKVIEW Series

On May 10, 2025, the City of Pisa suffered a ransomware attack within their computer systems. The next day Nova claimed the attack and on the 21st of ...
RHC Dark Lab - 02/06/2025 - 09:59

Android Under Attack: Godfather Malware Now Uses Virtualization to Fool Everyone

- June 21st, 2025

A new version of Android malware Godfather has been discovered that creates isolated virtual environments on mobile devices to steal data from banking applications. Recall that Godfather was first discovered in March...

Facebook Linkedin X

ChatGPT is Shutting Down Our Brains! Alarming MIT Research Shows Mental Decay

- June 21st, 2025

During a RHC Conference, Corrado Giustozzi underlined a truth as simple as it is powerful: “Human beings have always been creators of amplifiers.”. From the wheel to the car, every...

Facebook Linkedin X

AKIRA emergency report: the ransomware that is breaching Italy

- June 21st, 2025

Spring 2025 will be remembered as a turning point in our country's cyber chronicle. As bulletins and technical releases follow one another, one fact emerges glaringly: AKIRA has entered the...

Facebook Linkedin X

RHC GhostSec interview: hacktivism in the shadows of terrorism and cyber conflict

- June 11th, 2025

Ghost Security, also known as GhostSec, is a hacktivist group which emerged in the context of the cyber war against Islamic extremism. The first actions of the group date back...

Facebook Linkedin X

Group-IB contributes to INTERPOL’s Operation Secure, leading to the arrest of 32 suspects linked to information stealer malware in Asia

- June 10th, 2025

[Singapore; 11 June, 2025] Group-IB, a leading creator of cybersecurity technologies to investigate, prevent, and fight digital crime, announced today that it has contributed to INTERPOL’s “Operation Secure”, which took...

Facebook Linkedin X

RHC Interviews NOVA Ransomware – “Expect Dangerous Attacks. No One Is Safe.” | BLACKVIEW Series

- June 1st, 2025

On May 10, 2025, the City of Pisa suffered a ransomware attack within their computer systems. The next day Nova claimed the attack and on the 21st of the same...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE