Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
TM RedHotCyber 320x100 042514
970x120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Tor Boosts Security with Counter Galois Onion CGO Encryption
Di Redazione RHC - 27/11/2025

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

Immagine del sito
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Di Redazione RHC - 26/11/2025

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Immagine del sito
Investment Scam Alert: How to Avoid Losing Thousands
Di Redazione RHC - 26/11/2025

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

Immagine del sito
Malware Uses Finger Command to Infect Windows Devices
Di Redazione RHC - 26/11/2025

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

Immagine del sito
The AGI Revolution: How Mark Gubrud’s Term Changed Tech Forever
Di Redazione RHC - 25/11/2025

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...

HarmonyOS: 1 billion devices and a growing open-source ecosystem

The Open Source Hongmeng Technology Conference 2025, recently held in Changsha, highlighted the achievements of HarmonyOS " Hongmeng " (鸿蒙), the open ...
Redazione RHC - 30/09/2025 - 11:09

Back to the On-Prem: Austrian Armed Forces Choose LibreOffice

In recent years, many companies have gone cloud-first , outsourcing critical infrastructure and business services to platforms managed by external pro...
Redazione RHC - 30/09/2025 - 10:12

Digital Crisis Management: Communication Is the Key to Success or Failure

In recent years, cyberattacks have become a major threat to businesses, regardless of industry. While technical departments focus on troubleshooting a...
Redazione RHC - 30/09/2025 - 09:25

A joke extension and Chat Control crashes! Houston, we have a problem… with privacy

In 2025, the European Union wants full control over private chats. The “Chat Control” regulation (proposal COM(2022)209) claims to fight child pornogr...
Sergio Corpettini - 30/09/2025 - 07:49

Balancing speed and security! This is the real challenge of Vibe Coding.

The cybersecurity industry is undergoing a transformation: artificial intelligence is becoming not just a tool for developers, but also a weapon for a...
Redazione RHC - 30/09/2025 - 07:22

TOR Anonymizer v3.0: Advanced Digital Privacy Protection

In a digital landscape increasingly characterized by mass surveillance and indiscriminate data collection, the pursuit of online anonymity has become ...
Andrea Mongelli - 30/09/2025 - 07:09
1 89 90 91 92 93 256

HarmonyOS: 1 billion devices and a growing open-source ecosystem

- September 29th, 2025

The Open Source Hongmeng Technology Conference 2025, recently held in Changsha, highlighted the achievements of HarmonyOS " Hongmeng " (鸿蒙), the open source operating system developed by Huawei. Richard Yu,...

Facebook Linkedin X

Back to the On-Prem: Austrian Armed Forces Choose LibreOffice

- September 29th, 2025

In recent years, many companies have gone cloud-first , outsourcing critical infrastructure and business services to platforms managed by external providers. However, recent events and growing concerns about digital sovereignty...

Facebook Linkedin X

Digital Crisis Management: Communication Is the Key to Success or Failure

- September 29th, 2025

In recent years, cyberattacks have become a major threat to businesses, regardless of industry. While technical departments focus on troubleshooting and restoring systems, the true test of an organization's ability...

Facebook Linkedin X

A joke extension and Chat Control crashes! Houston, we have a problem… with privacy

- September 29th, 2025

In 2025, the European Union wants full control over private chats. The “Chat Control” regulation (proposal COM(2022)209) claims to fight child pornography by scanning private messages on WhatsApp, Telegram, Gmail,...

Facebook Linkedin X

Balancing speed and security! This is the real challenge of Vibe Coding.

- September 29th, 2025

The cybersecurity industry is undergoing a transformation: artificial intelligence is becoming not just a tool for developers, but also a weapon for attackers. And we've talked about this extensively. This...

Facebook Linkedin X

TOR Anonymizer v3.0: Advanced Digital Privacy Protection

- September 29th, 2025

In a digital landscape increasingly characterized by mass surveillance and indiscriminate data collection, the pursuit of online anonymity has become a primary necessity for journalists, activists, and researchers. It is...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE