Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...
Telegram opens an artificial intelligence lab in Kazakhstan
CISA Alert: Sudo Bug Affects Linux and Unix! Urgent Action Required by October 20th
Work and artificial intelligence: rising salaries for those who use AI?
And the drones are going to hell! The anti-drone technology developed by the USA
Microsoft goes all out with shoes! They’ve launched collectible Windows XP-themed Crocs
The future of submarine cables: 48% longer by 2040. Are we really ready?

Telegram opens an artificial intelligence lab in Kazakhstan
Redazione RHC - October 2nd, 2025
Telegram founder Pavel Durov announced the opening of a new artificial intelligence lab in Kazakhstan . The announcement was made in Astana during the Digital Bridge 2025 international forum. The...

CISA Alert: Sudo Bug Affects Linux and Unix! Urgent Action Required by October 20th
Redazione RHC - October 2nd, 2025
The Cyberspace and Infrastructure Security Center (CISA) recently added the critical vulnerability in the Sudo utility to its Actively Exploited Vulnerabilities (KEV) list. This effectively prompts government agencies to take...

Work and artificial intelligence: rising salaries for those who use AI?
Redazione RHC - October 2nd, 2025
The debate over artificial intelligence applied to the world of work is currently intensifying, a clear sign of how digital technology is radically transforming employment methods, skills, and dynamics. The...

And the drones are going to hell! The anti-drone technology developed by the USA
Redazione RHC - October 2nd, 2025
The American company Epirus has provided an impressive demonstration of its Leonidas microwave defense system, designed to combat drones. At the Camp Atterbury test site in Indiana, the system was...

Microsoft goes all out with shoes! They’ve launched collectible Windows XP-themed Crocs
Redazione RHC - October 1st, 2025
This year, Microsoft celebrates its first 50 years, a milestone that reflects the company's transformation from a small startup in 1975 to a global technology giant. Founded by Bill Gates...

The future of submarine cables: 48% longer by 2040. Are we really ready?
Redazione RHC - October 1st, 2025
The undersea cables connecting the UK to the outside world are vital to the country, with transactions amounting to £220 billion every day. The Joint Committee on National Security Strategy...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

