Red Hot Cyber. The Cybersecurity Blog
Featured Articles

Post 462 on Durov’s official channel immediately went into “scream mode”: “ The end of the free internet. The free internet is becoming a tool of control .” No birthday wishes. Durov explain...

Security researchers have discovered a sophisticated exploit campaign that leverages a private out-of-band application security testing (OAST) service hosted on Google Cloud infrastructure. The campai...

The underground cybercrime market continues to evolve rapidly, fueled by specialized groups designing and selling tools for increasingly sophisticated digital scams. Among these, a particularly active...

American aviation and defense components manufacturer ADC Aerospace has found itself in the spotlight due to a possible cyber attack by the Play ransomware group, which appeared on their blog where cr...

This article analyzes the disclosure submitted to Microsoft and available in English on digitaldefense , where images, demonstration videos and a Python code example are available. In recent years, di...
US States Crack Down on VPNs and Online Privacy for Minors
Logitech Hit by Clop Ransomware Attack, Data Breach Exposed
Malware Uses Finger Command to Infect Windows Devices
The Future of Tech: How to Navigate the Digital World
Google Gemini 3.0 Shakes Nvidia’s AI Dominance with TPU Innovation
CISA Warns of Spyware Attacks on Mobile Messaging Apps

US States Crack Down on VPNs and Online Privacy for Minors
Redazione RHC - November 25th, 2025
Several U.S. states are debating new restrictions that could significantly change traditional approaches to online privacy . Legislators in Wisconsin and Michigan are considering initiatives to combat material deemed harmful...

Logitech Hit by Clop Ransomware Attack, Data Breach Exposed
Redazione RHC - November 25th, 2025
Logitech representatives have notified authorities of a cyberattack and a serious data breach . The notorious Clop ransomware group, which has been targeting companies for several months by exploiting a...

Malware Uses Finger Command to Infect Windows Devices
Redazione RHC - November 25th, 2025
A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet,...

The Future of Tech: How to Navigate the Digital World
Redazione RHC - November 25th, 2025
There are books that explain technology and books that make you understand why you should pause for a minute before scrolling through a feed. Il Futuro Prossimo , Sandro Sana...

Google Gemini 3.0 Shakes Nvidia’s AI Dominance with TPU Innovation
Redazione RHC - November 24th, 2025
Nvidia's dominance in the artificial intelligence (AI) sector was shaken by the acclaim for Google's "Gemini 3.0." Nvidia's stock price fell more than 2% in after-hours trading. SK Hynix, a...

CISA Warns of Spyware Attacks on Mobile Messaging Apps
Redazione RHC - November 24th, 2025
An important advisory was published on Monday by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) , warning that malicious actors are actively using commercial spyware tools and remote access...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

