Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Enterprise BusinessLog 320x200 1
Banner Ransomfeed 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
WhatsApp Web in the crosshairs! How the worm that distributes the banking Trojan works
Di Redazione RHC - 14/10/2025

Sophos analysts have discovered a complex malware operation by security experts that uses the popular messaging service WhatsApp to spread banking Trojans, targeting Brazilian banks and cryptocurrency...

Immagine del sito
RMPocalypse: A critical bug in AMD SEV-SNP threatens cloud security.
Di Redazione RHC - 13/10/2025

A critical vulnerability has been identified in the AMD SEV-SNP hardware security architecture, impacting major cloud providers (AWS, Microsoft Azure, and Google Cloud) . This flaw allows malicious hy...

Immagine del sito
Spyware yes, spyware no: it’s just a prospect! NSO Group is now under US control.
Di Redazione RHC - 13/10/2025

Israeli company NSO Group, developer of the infamous Pegasus spyware , recently came under the control of American investors. A company spokesperson announced that the new funding amounts to tens of m...

Immagine del sito
DAS: The world’s ear hidden in submarine cables
Di Redazione RHC - 13/10/2025

Over 1.2 million kilometers of fiber optic cables lie on the ocean floor, long considered solely part of a global telecommunications network. However, distributed acoustic sensing (DAS) technology , r...

Immagine del sito
Between AI and fear, Skynet teaches: “We’ll build bunkers before launching AGI.”
Di Redazione RHC - 12/10/2025

The quote, “We’ll definitely build a bunker before we launch AGI,” that inspired the article, was attributed to a Silicon Valley leader, though it’s unclear who exactly he meant by “we.” T...

Vulnerability in Windows RPC protocol: Spoofing and impersonation attacks reported

SafeBreach experts have disclosed details of a vulnerability in the Windows Remote Procedure Call (RPC) protocol, patched by Microsoft in the July 202...
Redazione RHC - 21/09/2025 - 20:57

Patchwork Launches Spear-Phishing Campaign Against Turkish Defense

The Patchwork group, also known by the aliases APT-C-09, APT-Q-36, Chinastrats, Dropping Elephant, Operation Hangover, Quilted Tiger, and Zinc Emerson...
Redazione RHC - 21/09/2025 - 20:53

Hackers don’t want to save you: they want to erase you.

Hackers are increasingly targeting backups – not systems or servers, but the data that companies retain for a limited period of time so they can recov...
Redazione RHC - 21/09/2025 - 11:37

The Story of Microsoft Solitaire: From Launch with Windows 3.0 to Enduring Success

Microsoft first released Solitaire in 1990 with Windows 3.0, as a tool to familiarize users with the graphical interface and mouse use. The game was c...
Redazione RHC - 21/09/2025 - 10:09

Removing private data from AI models? Now you can without accessing the original datasets.

A team from the University of California, Riverside, has demonstrated a new way to remove private and copyrighted data from AI models without accessin...
Redazione RHC - 21/09/2025 - 10:02

Edge vs. Chrome: Microsoft promotes its browser with aggressive ads on Bing

Microsoft has once again launched an aggressive campaign for its proprietary Edge browser. This time, the software giant is displaying a comprehensive...
Redazione RHC - 21/09/2025 - 09:56
1 33 34 35 36 37 187

Vulnerability in Windows RPC protocol: Spoofing and impersonation attacks reported

- September 21st, 2025

SafeBreach experts have disclosed details of a vulnerability in the Windows Remote Procedure Call (RPC) protocol, patched by Microsoft in the July 2025 update. The flaw, CVE-2025-49760, allowed an attacker...

Facebook Linkedin X

Bandiera turchia

Patchwork Launches Spear-Phishing Campaign Against Turkish Defense

- September 21st, 2025

The Patchwork group, also known by the aliases APT-C-09, APT-Q-36, Chinastrats, Dropping Elephant, Operation Hangover, Quilted Tiger, and Zinc Emerson , has launched a new spear-phishing campaign targeting the Turkish...

Facebook Linkedin X

Hackers don’t want to save you: they want to erase you.

- September 21st, 2025

Hackers are increasingly targeting backups – not systems or servers, but the data that companies retain for a limited period of time so they can recover from attacks. A new...

Facebook Linkedin X

The Story of Microsoft Solitaire: From Launch with Windows 3.0 to Enduring Success

- September 21st, 2025

Microsoft first released Solitaire in 1990 with Windows 3.0, as a tool to familiarize users with the graphical interface and mouse use. The game was created by Wes Cherry, with...

Facebook Linkedin X

Removing private data from AI models? Now you can without accessing the original datasets.

- September 21st, 2025

A team from the University of California, Riverside, has demonstrated a new way to remove private and copyrighted data from AI models without accessing the original datasets. The solution addresses...

Facebook Linkedin X

Edge vs. Chrome: Microsoft promotes its browser with aggressive ads on Bing

- September 21st, 2025

Microsoft has once again launched an aggressive campaign for its proprietary Edge browser. This time, the software giant is displaying a comprehensive comparison table between Edge and Chrome directly on...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE