Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...
HarmonyOS: 1 billion devices and a growing open-source ecosystem
Back to the On-Prem: Austrian Armed Forces Choose LibreOffice
Digital Crisis Management: Communication Is the Key to Success or Failure
A joke extension and Chat Control crashes! Houston, we have a problem… with privacy
Balancing speed and security! This is the real challenge of Vibe Coding.
TOR Anonymizer v3.0: Advanced Digital Privacy Protection

HarmonyOS: 1 billion devices and a growing open-source ecosystem
Redazione RHC - September 29th, 2025
The Open Source Hongmeng Technology Conference 2025, recently held in Changsha, highlighted the achievements of HarmonyOS " Hongmeng " (鸿蒙), the open source operating system developed by Huawei. Richard Yu,...

Back to the On-Prem: Austrian Armed Forces Choose LibreOffice
Redazione RHC - September 29th, 2025
In recent years, many companies have gone cloud-first , outsourcing critical infrastructure and business services to platforms managed by external providers. However, recent events and growing concerns about digital sovereignty...

Digital Crisis Management: Communication Is the Key to Success or Failure
Redazione RHC - September 29th, 2025
In recent years, cyberattacks have become a major threat to businesses, regardless of industry. While technical departments focus on troubleshooting and restoring systems, the true test of an organization's ability...

A joke extension and Chat Control crashes! Houston, we have a problem… with privacy
Sergio Corpettini - September 29th, 2025
In 2025, the European Union wants full control over private chats. The “Chat Control” regulation (proposal COM(2022)209) claims to fight child pornography by scanning private messages on WhatsApp, Telegram, Gmail,...

Balancing speed and security! This is the real challenge of Vibe Coding.
Redazione RHC - September 29th, 2025
The cybersecurity industry is undergoing a transformation: artificial intelligence is becoming not just a tool for developers, but also a weapon for attackers. And we've talked about this extensively. This...

TOR Anonymizer v3.0: Advanced Digital Privacy Protection
Andrea Mongelli - September 29th, 2025
In a digital landscape increasingly characterized by mass surveillance and indiscriminate data collection, the pursuit of online anonymity has become a primary necessity for journalists, activists, and researchers. It is...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

