Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The Russian Federation’s Roskomnadzor has announced that it continues to impose systematic restrictions on the messaging app WhatsApp due to violations of Russian law. According to the agency, the s...

The Shai-Hulud worm has spread beyond the npm ecosystem and was discovered in Maven . Socket specialists noticed an infected package on Maven Central containing the same malicious components used in t...

Artificial intelligence is currently capable of performing work equivalent to 11.7% of US employment . And not just in theory: in terms of monetary value, this value is already comparable to the salar...

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...
CISA Warns of Spyware Attacks on Mobile Messaging Apps
New ClickFix Malware Campaign Targets Windows Users with Fake Updates
GDPR Data Breach: Email Errors and Consequences
Ettore Accenti: The Italian Tech Pioneer Who Brought Intel to Italy
The AGI Revolution: How Mark Gubrud’s Term Changed Tech Forever
Anthropic Releases Claude Opus 4.5: AI Model for Enhanced Productivity

CISA Warns of Spyware Attacks on Mobile Messaging Apps
Redazione RHC - November 24th, 2025
An important advisory was published on Monday by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) , warning that malicious actors are actively using commercial spyware tools and remote access...

New ClickFix Malware Campaign Targets Windows Users with Fake Updates
Redazione RHC - November 24th, 2025
Fake Windows updates have entered a new round of ClickFix campaigns, as reported by Huntress. Attackers are increasingly replacing bot controls with full-screen blue windows that simulate a system update....

GDPR Data Breach: Email Errors and Consequences
Stefano Gazzella - November 24th, 2025
Like it or not, sending an email to the wrong recipient constitutes a personal data breach under the GDPR. This obviously applies if the email contains personal data or if...

Ettore Accenti: The Italian Tech Pioneer Who Brought Intel to Italy
Carlo Denza - November 24th, 2025
With exclusive photographs and unpublished documents: the extraordinary story of the Italian engineer who collaborated with Gordon Moore and Alan Sugar, bringing Intel to Italy and building the first tech...

The AGI Revolution: How Mark Gubrud’s Term Changed Tech Forever
Redazione RHC - November 24th, 2025
On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app....

Anthropic Releases Claude Opus 4.5: AI Model for Enhanced Productivity
Redazione RHC - November 23rd, 2025
Anthropic has released Claude Opus 4.5 , its new flagship model, which the company says is the most powerful version yet and ranks at the top of the class for...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

