Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...
Never accept USB flash drives from strangers! A practical example of physical hacking with a USB flash drive.
An SVG file disguised as a PDF led victims to a fake login
Airports shut down, ransomware, four days of chaos, and a suspect arrested. An attack that shook Europe.
One added line of code and thousands of companies hacked. This is the magic of the Supply Chain!
Rhadamanthys Stealer: Introduces an AI feature to extract seed phrases from images
Active Directory nel mirino! Come i criminal hacker rubano NTDS.dit

Never accept USB flash drives from strangers! A practical example of physical hacking with a USB flash drive.
Massimiliano Brolli - September 26th, 2025
Have you ever been told that if you find a USB flash drive on the ground, you shouldn't plug it into your computer? Today, we'll explain why you shouldn't do...

An SVG file disguised as a PDF led victims to a fake login
Redazione RHC - September 26th, 2025
Microsoft Threat Intelligence specialists have identified an attack in which attackers used artificial intelligence for the first time to disguise phishing code. The goal was to steal credentials from companies...

Airports shut down, ransomware, four days of chaos, and a suspect arrested. An attack that shook Europe.
Redazione RHC - September 26th, 2025
On September 19, a major cyber incident occurred in Europe, affecting Collins Aerospace, one of the world's largest aerospace technology suppliers . The attack disrupted airline operations and affected flights...

One added line of code and thousands of companies hacked. This is the magic of the Supply Chain!
Redazione RHC - September 26th, 2025
Developers learned to trust the tools that help their AI assistants handle routine tasks, from sending emails to using databases. But this trust proved vulnerable: the postmark-mcp package, downloaded over...

Rhadamanthys Stealer: Introduces an AI feature to extract seed phrases from images
Redazione RHC - September 25th, 2025
Rhadamanthys is an advanced information stealer that first emerged in 2022. Featuring a rapid development cycle—with at least ten different releases since its inception—the malware is promoted and marketed on...

Active Directory nel mirino! Come i criminal hacker rubano NTDS.dit
Redazione RHC - September 25th, 2025
Active Directory (AD) contains the organization's digital keys: unauthorized access to this service exposes sensitive information and credentials that can lead to a complete domain compromise. Among the most critical...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

