Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...
Klopatra Arrives! The Banking Trojan That Threatens Android Users
Data Act: Yet another regulation? Yes. But this one really changes the game (even for those in security).
Google Drive defends itself from ransomware! AI blocks attacks
Microsoft Outlook is in chaos: the Windows client crashes and blocks mailboxes.
Phantom Taurus: The Chinese Hacker Group That Spies on Governments and Embassies
Discovering Prompt Injection: When AI Gets Fooled by Words

Klopatra Arrives! The Banking Trojan That Threatens Android Users
Redazione RHC - October 1st, 2025
An Android banking Trojan and RAT called Klopatra masquerades as an IPTV and VPN app and has already infected over 3,000 devices . The malware is a Trojan capable of...

Data Act: Yet another regulation? Yes. But this one really changes the game (even for those in security).
Sandro Sana - October 1st, 2025
Every time Brussels churns out a new acronym, someone in the company snorts: "More paper?" It happens. But the Data Act isn't just a stamp to add to the binder:...

Google Drive defends itself from ransomware! AI blocks attacks
Redazione RHC - October 1st, 2025
Google has unveiled a new AI tool for Drive for desktop. The model is said to have been trained on millions of real-world ransomware samples and can suspend syncing to...

Microsoft Outlook is in chaos: the Windows client crashes and blocks mailboxes.
Redazione RHC - October 1st, 2025
Microsoft has announced that it is investigating a significant issue with the traditional Outlook desktop client for the Windows operating system, which causes the application to crash upon startup. When...

Phantom Taurus: The Chinese Hacker Group That Spies on Governments and Embassies
Redazione RHC - October 1st, 2025
A new hacker group linked to the Chinese Communist Party has been identified by experts at Palo Alto Networks. Unit 42, the California-based company's threat intelligence division, has released a...

Discovering Prompt Injection: When AI Gets Fooled by Words
Manuel Roccon - October 1st, 2025
Generative Artificial Intelligence (GenAI) systems are revolutionizing the way we interact with technology, offering extraordinary capabilities in the creation of text, images, and code. However, this innovation brings with it...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

