Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...
Code as we knew it is dead! Artificial Intelligence writes the future.
Cryptocurrencies, ransomware, and hamburgers: the fatal combo for Scattered Spider
Blade Runner Already Predicted Deepfake! Cyber Lessons from Film Classics
The freebie party is over! Open source infrastructure is at risk and needs funding.
Zero-Day Vulnerabilities Found in Cisco IOS and IOS XE: Urgent Updates
Artificial Intelligence: A Double-Edged Sword in Digital Security

Code as we knew it is dead! Artificial Intelligence writes the future.
Redazione RHC - September 24th, 2025
Since 2013, the IEEE has published an annual interactive ranking of the most popular programming languages . However, traditional methods of measuring popularity may be losing their meaning today, due...

Cryptocurrencies, ransomware, and hamburgers: the fatal combo for Scattered Spider
Redazione RHC - September 24th, 2025
The U.S. Department of Justice and British police have charged Talha Jubair, 19, a resident of East London, who investigators believe is a key member of Scattered Spider , a...

Blade Runner Already Predicted Deepfake! Cyber Lessons from Film Classics
Daniela Farina - September 24th, 2025
“ Art is a mirror that reflects the soul of the beholder.” This quote, which captures the essence of our experience with cinema, takes on crucial significance when discussing cybersecurity....

The freebie party is over! Open source infrastructure is at risk and needs funding.
Redazione RHC - September 24th, 2025
An open letter signed by major open source foundations has raised the alarm about the future of the infrastructure that supports modern software development. The Open Source Security Foundation (OpenSSF),...

Zero-Day Vulnerabilities Found in Cisco IOS and IOS XE: Urgent Updates
Redazione RHC - September 24th, 2025
Cisco has disclosed a zero-day vulnerability, tracked as CVE-2025-20352, in its widely used IOS and IOS XE software; this vulnerability appears to be actively exploited. This vulnerability was initially identified...

Artificial Intelligence: A Double-Edged Sword in Digital Security
Redazione RHC - September 24th, 2025
Artificial intelligence is increasingly being described as a double-edged sword, capable of offering enormous advantages but also opening new avenues for digital crime. During the " TRUST AICS - 2025"...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

