Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...
Balancing speed and security! This is the real challenge of Vibe Coding.
TOR Anonymizer v3.0: Advanced Digital Privacy Protection
Three serious vulnerabilities discovered in VMware vCenter and NSX: apply patches immediately.
0-day 0-click WhatsApp! All it takes is one image to take control of your iPhone.
Computer science graduates with no future! Thousands of resumes ignored, and goodbye to six-figure salaries.
The US wants to hack Telegram! The case sparks debate over privacy and jurisdiction.

Balancing speed and security! This is the real challenge of Vibe Coding.
Redazione RHC - September 29th, 2025
The cybersecurity industry is undergoing a transformation: artificial intelligence is becoming not just a tool for developers, but also a weapon for attackers. And we've talked about this extensively. This...

TOR Anonymizer v3.0: Advanced Digital Privacy Protection
Andrea Mongelli - September 29th, 2025
In a digital landscape increasingly characterized by mass surveillance and indiscriminate data collection, the pursuit of online anonymity has become a primary necessity for journalists, activists, and researchers. It is...

Three serious vulnerabilities discovered in VMware vCenter and NSX: apply patches immediately.
Redazione RHC - September 28th, 2025
On September 29, 2025, Broadcom released security advisory VMSA-2025-0016 , addressing three vulnerabilities identified in VMware vCenter and VMware NSX products. The bugs affect several solutions in the VMware ecosystem...

0-day 0-click WhatsApp! All it takes is one image to take control of your iPhone.
Redazione RHC - September 28th, 2025
Some spyware producer is probably doing gymnastics... tearing their hair out. But it's the usual charade: someone finds, someone cashes in, someone integrates, and then the researcher on duty comes...

Computer science graduates with no future! Thousands of resumes ignored, and goodbye to six-figure salaries.
Redazione RHC - September 28th, 2025
Alarming trends are emerging in the IT job market. More and more computer science graduates are unable to find work, even at minimum wage. A computer science degree was once...

The US wants to hack Telegram! The case sparks debate over privacy and jurisdiction.
Redazione RHC - September 28th, 2025
The U.S. Department of Justice has received court authorization to conduct a remote inspection of Telegram's servers as part of an investigation into child exploitation. The prosecutor's motion stated that...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

