Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
320×100
Enterprise BusinessLog 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Tor Boosts Security with Counter Galois Onion CGO Encryption
Di Redazione RHC - 27/11/2025

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

Immagine del sito
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Di Redazione RHC - 26/11/2025

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Immagine del sito
Investment Scam Alert: How to Avoid Losing Thousands
Di Redazione RHC - 26/11/2025

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

Immagine del sito
Malware Uses Finger Command to Infect Windows Devices
Di Redazione RHC - 26/11/2025

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

Immagine del sito
The AGI Revolution: How Mark Gubrud’s Term Changed Tech Forever
Di Redazione RHC - 25/11/2025

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...

A US agency was hacked due to an unresolved patch. CISA: Conduct vulnerability assessments!

Experts at the U.S. Cybersecurity and Infrastructure Security Agency (CISA) have reported a serious incident: hackers gained access to the network of ...
Redazione RHC - 26/09/2025 - 07:47

Ransomware attack on European airports leaves Berlin in “emergency mode”

Berlin Airport (BER) remains in "emergency mode" for the fifth day after a major cyberattack on its supply chain. Der Spiegel reported the news in yes...
Redazione RHC - 26/09/2025 - 07:06

Commodore 64: From the Legend of the ’80s to 2025! 10,000 New Consoles Sold

Commodore Corporation BV was recently acquired by fans and former employees. Now, the new Commodore brand has announced a significant milestone: the f...
Redazione RHC - 26/09/2025 - 07:00

Two critical bugs in Cisco ASA and FTD: score 9.9 and risk of remote code execution

Cisco has disclosed two critical vulnerabilities affecting its Secure Firewall Adaptive Security Appliance (ASA) and Secure Firewall Threat Defense (F...
Redazione RHC - 25/09/2025 - 19:29

Linux dances the samba… but hits a race condition. A critical flaw threatens the kernel.

Trend Research researcher Nicholas Zubrisky has reported a critical vulnerability in the ksmbd component of the Linux kernel that allows remote attack...
Redazione RHC - 25/09/2025 - 16:24

They slept on networks for 393 days! Chinese state hackers and the BRICKSTORM backdoor

According to Google Threat Intelligence , the China-linked espionage group UNC5221 has carried out a series of successful intrusions into corporate ne...
Redazione RHC - 25/09/2025 - 14:29
1 96 97 98 99 100 256

A US agency was hacked due to an unresolved patch. CISA: Conduct vulnerability assessments!

- September 25th, 2025

Experts at the U.S. Cybersecurity and Infrastructure Security Agency (CISA) have reported a serious incident: hackers gained access to the network of a civilian federal agency by exploiting a critical...

Facebook Linkedin X

Ransomware attack on European airports leaves Berlin in “emergency mode”

- September 25th, 2025

Berlin Airport (BER) remains in "emergency mode" for the fifth day after a major cyberattack on its supply chain. Der Spiegel reported the news in yesterday's update. IT services provider...

Facebook Linkedin X

Commodore 64: From the Legend of the ’80s to 2025! 10,000 New Consoles Sold

- September 25th, 2025

Commodore Corporation BV was recently acquired by fans and former employees. Now, the new Commodore brand has announced a significant milestone: the first Commodore 64 Ultimate computer in 30 years...

Facebook Linkedin X

Two critical bugs in Cisco ASA and FTD: score 9.9 and risk of remote code execution

- September 24th, 2025

Cisco has disclosed two critical vulnerabilities affecting its Secure Firewall Adaptive Security Appliance (ASA) and Secure Firewall Threat Defense (FTD) firewalls, as well as other networking products. Both flaws allow...

Facebook Linkedin X

Linux dances the samba… but hits a race condition. A critical flaw threatens the kernel.

- September 24th, 2025

Trend Research researcher Nicholas Zubrisky has reported a critical vulnerability in the ksmbd component of the Linux kernel that allows remote attackers to execute arbitrary code with maximum system privileges....

Facebook Linkedin X

They slept on networks for 393 days! Chinese state hackers and the BRICKSTORM backdoor

- September 24th, 2025

According to Google Threat Intelligence , the China-linked espionage group UNC5221 has carried out a series of successful intrusions into corporate networks since March of this year, exploiting previously unknown...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE