Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...
A US agency was hacked due to an unresolved patch. CISA: Conduct vulnerability assessments!
Ransomware attack on European airports leaves Berlin in “emergency mode”
Commodore 64: From the Legend of the ’80s to 2025! 10,000 New Consoles Sold
Two critical bugs in Cisco ASA and FTD: score 9.9 and risk of remote code execution
Linux dances the samba… but hits a race condition. A critical flaw threatens the kernel.
They slept on networks for 393 days! Chinese state hackers and the BRICKSTORM backdoor

A US agency was hacked due to an unresolved patch. CISA: Conduct vulnerability assessments!
Redazione RHC - September 25th, 2025
Experts at the U.S. Cybersecurity and Infrastructure Security Agency (CISA) have reported a serious incident: hackers gained access to the network of a civilian federal agency by exploiting a critical...

Ransomware attack on European airports leaves Berlin in “emergency mode”
Redazione RHC - September 25th, 2025
Berlin Airport (BER) remains in "emergency mode" for the fifth day after a major cyberattack on its supply chain. Der Spiegel reported the news in yesterday's update. IT services provider...

Commodore 64: From the Legend of the ’80s to 2025! 10,000 New Consoles Sold
Redazione RHC - September 25th, 2025
Commodore Corporation BV was recently acquired by fans and former employees. Now, the new Commodore brand has announced a significant milestone: the first Commodore 64 Ultimate computer in 30 years...

Two critical bugs in Cisco ASA and FTD: score 9.9 and risk of remote code execution
Redazione RHC - September 24th, 2025
Cisco has disclosed two critical vulnerabilities affecting its Secure Firewall Adaptive Security Appliance (ASA) and Secure Firewall Threat Defense (FTD) firewalls, as well as other networking products. Both flaws allow...

Linux dances the samba… but hits a race condition. A critical flaw threatens the kernel.
Redazione RHC - September 24th, 2025
Trend Research researcher Nicholas Zubrisky has reported a critical vulnerability in the ksmbd component of the Linux kernel that allows remote attackers to execute arbitrary code with maximum system privileges....

They slept on networks for 393 days! Chinese state hackers and the BRICKSTORM backdoor
Redazione RHC - September 24th, 2025
According to Google Threat Intelligence , the China-linked espionage group UNC5221 has carried out a series of successful intrusions into corporate networks since March of this year, exploiting previously unknown...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

