Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...
As Windows 10 retires, Windows 7 installs double in two months
Bill Gates: Programmers are not at risk! AI is a tool, not a competitor.
Global attacks on Cisco devices: Cyber agencies warn of ongoing crisis
A DLL hijacking bug targets Notepad++. Risk of arbitrary code execution.
Google Project Zero Researcher Reveals How to Bypass ASLR on macOS and iOS
Make training an adventure! Choose Betti RHC for your cybersecurity awareness.

As Windows 10 retires, Windows 7 installs double in two months
Redazione RHC - September 28th, 2025
Windows 7 was one of Microsoft's best operating systems, and many still praise its stability today . But Microsoft discontinued support for this operating system marvel in January 2020. According...

Bill Gates: Programmers are not at risk! AI is a tool, not a competitor.
Redazione RHC - September 28th, 2025
Artificial intelligence is rapidly changing traditional professions. Just yesterday, we reported that the demand for software engineers has dropped 71% in the last three years. But according to Bill Gates...

Global attacks on Cisco devices: Cyber agencies warn of ongoing crisis
Redazione RHC - September 28th, 2025
Major agencies around the world have raised the alarm about a critical threat to network infrastructure: vulnerabilities in Cisco Adaptive Security Appliance (ASA) and Firepower devices have been targeted by...

A DLL hijacking bug targets Notepad++. Risk of arbitrary code execution.
Redazione RHC - September 28th, 2025
A critical DLL hijacking vulnerability has been identified in Notepad++ version 8.8.3 by security researchers, with the flaw assigned CVE-2025-56383. The vulnerability specifically targets the Notepad++ plugin system, specifically the...

Google Project Zero Researcher Reveals How to Bypass ASLR on macOS and iOS
Redazione RHC - September 28th, 2025
A researcher on Google's Project Zero team has revealed a new method for remotely exfiltrating memory addresses on Apple's macOS and iOS operating systems. The research stemmed from a 2024...

Make training an adventure! Choose Betti RHC for your cybersecurity awareness.
Redazione RHC - September 28th, 2025
Are you tired of boring e-learning training courses? Do you really want to educate your company's employees about bad and erroneous behaviors so you can keep your company safe? Great!...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

