Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Redhotcyber Banner Sito 320x100px Uscita 101125
Crowdstriker 970×120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Tor Boosts Security with Counter Galois Onion CGO Encryption
Di Redazione RHC - 27/11/2025

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

Immagine del sito
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Di Redazione RHC - 26/11/2025

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Immagine del sito
Investment Scam Alert: How to Avoid Losing Thousands
Di Redazione RHC - 26/11/2025

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

Immagine del sito
Malware Uses Finger Command to Infect Windows Devices
Di Redazione RHC - 26/11/2025

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

Immagine del sito
The AGI Revolution: How Mark Gubrud’s Term Changed Tech Forever
Di Redazione RHC - 25/11/2025

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...

Never accept USB flash drives from strangers! A practical example of physical hacking with a USB flash drive.

Have you ever been told that if you find a USB flash drive on the ground, you shouldn't plug it into your computer? Today, we'll explain why you shoul...
Massimiliano Brolli - 27/09/2025 - 11:50

An SVG file disguised as a PDF led victims to a fake login

Microsoft Threat Intelligence specialists have identified an attack in which attackers used artificial intelligence for the first time to disguise phi...
Redazione RHC - 27/09/2025 - 11:15

Airports shut down, ransomware, four days of chaos, and a suspect arrested. An attack that shook Europe.

On September 19, a major cyber incident occurred in Europe, affecting Collins Aerospace, one of the world's largest aerospace technology suppliers . T...
Redazione RHC - 27/09/2025 - 10:55

One added line of code and thousands of companies hacked. This is the magic of the Supply Chain!

Developers learned to trust the tools that help their AI assistants handle routine tasks, from sending emails to using databases. But this trust prove...
Redazione RHC - 27/09/2025 - 10:54

Rhadamanthys Stealer: Introduces an AI feature to extract seed phrases from images

Rhadamanthys is an advanced information stealer that first emerged in 2022. Featuring a rapid development cycle—with at least ten different releases s...
Redazione RHC - 26/09/2025 - 17:16

Active Directory nel mirino! Come i criminal hacker rubano NTDS.dit

Active Directory (AD) contains the organization's digital keys: unauthorized access to this service exposes sensitive information and credentials that...
Redazione RHC - 26/09/2025 - 16:16
1 94 95 96 97 98 256

Never accept USB flash drives from strangers! A practical example of physical hacking with a USB flash drive.

- September 26th, 2025

Have you ever been told that if you find a USB flash drive on the ground, you shouldn't plug it into your computer? Today, we'll explain why you shouldn't do...

Facebook Linkedin X

An SVG file disguised as a PDF led victims to a fake login

- September 26th, 2025

Microsoft Threat Intelligence specialists have identified an attack in which attackers used artificial intelligence for the first time to disguise phishing code. The goal was to steal credentials from companies...

Facebook Linkedin X

Airports shut down, ransomware, four days of chaos, and a suspect arrested. An attack that shook Europe.

- September 26th, 2025

On September 19, a major cyber incident occurred in Europe, affecting Collins Aerospace, one of the world's largest aerospace technology suppliers . The attack disrupted airline operations and affected flights...

Facebook Linkedin X

One added line of code and thousands of companies hacked. This is the magic of the Supply Chain!

- September 26th, 2025

Developers learned to trust the tools that help their AI assistants handle routine tasks, from sending emails to using databases. But this trust proved vulnerable: the postmark-mcp package, downloaded over...

Facebook Linkedin X

Rhadamanthys Stealer: Introduces an AI feature to extract seed phrases from images

- September 25th, 2025

Rhadamanthys is an advanced information stealer that first emerged in 2022. Featuring a rapid development cycle—with at least ten different releases since its inception—the malware is promoted and marketed on...

Facebook Linkedin X

Active Directory nel mirino! Come i criminal hacker rubano NTDS.dit

- September 25th, 2025

Active Directory (AD) contains the organization's digital keys: unauthorized access to this service exposes sensitive information and credentials that can lead to a complete domain compromise. Among the most critical...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE