Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...
Discovering Prompt Injection: When AI Gets Fooled by Words
Can a camera read your mind? The answer comes from Portugal.
Microsoft challenges Nvidia and AMD with its proprietary chips for artificial intelligence.
China mandates AI content labels. Let’s see what’s happening.
MatrixPDF arrives: just a few clicks and phishing is served!
A critical bug in VMware Aria Operations and VMware Tools has been exploited by Chinese hackers for months.

Discovering Prompt Injection: When AI Gets Fooled by Words
Manuel Roccon - October 1st, 2025
Generative Artificial Intelligence (GenAI) systems are revolutionizing the way we interact with technology, offering extraordinary capabilities in the creation of text, images, and code. However, this innovation brings with it...

Can a camera read your mind? The answer comes from Portugal.
Redazione RHC - October 1st, 2025
A study conducted at the Champalimode Foundation in Portugal has shown that a simple video recording is enough to "peek" into the thought process. Scientists discovered that mice's facial expressions...

Microsoft challenges Nvidia and AMD with its proprietary chips for artificial intelligence.
Redazione RHC - October 1st, 2025
Microsoft is accelerating the in-house production of semiconductors for its data centers, aiming to reduce its dependence on external suppliers like Nvidia and AMD. Kevin Scott, the tech giant's Chief...

China mandates AI content labels. Let’s see what’s happening.
Redazione RHC - October 1st, 2025
Starting September 1, 2025, all artificial intelligence (AI)-generated content in China must be marked with an "electronic watermark," according to new legislation. The stated goal is to improve the transparency...

MatrixPDF arrives: just a few clicks and phishing is served!
Redazione RHC - September 30th, 2025
A new phishing toolkit, MatrixPDF , has been discovered that allows attackers to transform ordinary PDF files into interactive decoys that bypass email security and redirect victims to websites that...

A critical bug in VMware Aria Operations and VMware Tools has been exploited by Chinese hackers for months.
Redazione RHC - September 30th, 2025
Broadcom has fixed a severe privilege escalation vulnerability in VMware Aria Operations and VMware Tools that was exploited in attacks starting in October 2024. The issue has been assigned the...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

