Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Crowdstrike 320×100
Banner Desktop

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Tor Boosts Security with Counter Galois Onion CGO Encryption
Di Redazione RHC - 27/11/2025

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

Immagine del sito
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Di Redazione RHC - 26/11/2025

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Immagine del sito
Investment Scam Alert: How to Avoid Losing Thousands
Di Redazione RHC - 26/11/2025

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

Immagine del sito
Malware Uses Finger Command to Infect Windows Devices
Di Redazione RHC - 26/11/2025

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

Immagine del sito
The AGI Revolution: How Mark Gubrud’s Term Changed Tech Forever
Di Redazione RHC - 25/11/2025

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...

Fake Microsoft Teams installer! One-time certificates and a backdoor in the download

In recent days, a malvertising campaign targeting business users trying to download Microsoft Teams has been discovered. At first glance, the attack s...
Antonio Piazzolla - 29/09/2025 - 07:25

The pregnancy robot is coming! Is it fake news or a harbinger of things to come?

Earlier this month, news emerged about Chinese company Kaiwa Technology , which had reportedly created a "pregnancy robot." The news was accompanied b...
Redazione RHC - 29/09/2025 - 07:14

NIST Towards Post-Quantum Cryptography

NIST , through its National Cybersecurity Center of Excellence (NCCoE) , has released the first draft of a new document dedicated to post-quantum cryp...
Marcello Filacchioni - 29/09/2025 - 07:08

Critical flaws in Chinese robots. A zombie robot bonet can be remotely controlled.

On September 27, 2025, new concerns emerged about robots produced by China's Unitree Robotics , after serious vulnerabilities were reported that could...
Redazione RHC - 28/09/2025 - 18:12

Akira Ransomware: New Campaign Targets SonicWall Firewalls

Since late July 2025, a new wave of cyber attacks has been recorded targeting organizations equipped with SonicWall firewalls, with the active spread ...
Redazione RHC - 28/09/2025 - 15:03

Fujitsu unveils Post-K: the ARM supercomputer that will be 100 times faster than “K”

After having signed the contract to build the Japanese supercomputer "K," one of the most powerful in the world, Fujitsu has announced a new flagship ...
Redazione RHC - 28/09/2025 - 14:46
1 92 93 94 95 96 256

Fake Microsoft Teams installer! One-time certificates and a backdoor in the download

- September 28th, 2025

In recent days, a malvertising campaign targeting business users trying to download Microsoft Teams has been discovered. At first glance, the attack seems trivial: a sponsored ad leads to a...

Facebook Linkedin X

The pregnancy robot is coming! Is it fake news or a harbinger of things to come?

- September 28th, 2025

Earlier this month, news emerged about Chinese company Kaiwa Technology , which had reportedly created a "pregnancy robot." The news was accompanied by vivid images: a life-size figure with a...

Facebook Linkedin X

NIST Towards Post-Quantum Cryptography

- September 28th, 2025

NIST , through its National Cybersecurity Center of Excellence (NCCoE) , has released the first draft of a new document dedicated to post-quantum cryptography (PQC) . Cryptographic algorithms have always...

Facebook Linkedin X

Critical flaws in Chinese robots. A zombie robot bonet can be remotely controlled.

- September 27th, 2025

On September 27, 2025, new concerns emerged about robots produced by China's Unitree Robotics , after serious vulnerabilities were reported that could expose thousands of devices to remote control and...

Facebook Linkedin X

Akira Ransomware: New Campaign Targets SonicWall Firewalls

- September 27th, 2025

Since late July 2025, a new wave of cyber attacks has been recorded targeting organizations equipped with SonicWall firewalls, with the active spread of the Akira ransomware. According to researchers...

Facebook Linkedin X

Fujitsu unveils Post-K: the ARM supercomputer that will be 100 times faster than “K”

- September 27th, 2025

After having signed the contract to build the Japanese supercomputer "K," one of the most powerful in the world, Fujitsu has announced a new flagship project: Post-K , based on...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE