Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Enterprise BusinessLog 320x200 1
LECS 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Tor Boosts Security with Counter Galois Onion CGO Encryption
Di Redazione RHC - 27/11/2025

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

Immagine del sito
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Di Redazione RHC - 26/11/2025

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Immagine del sito
Investment Scam Alert: How to Avoid Losing Thousands
Di Redazione RHC - 26/11/2025

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

Immagine del sito
Malware Uses Finger Command to Infect Windows Devices
Di Redazione RHC - 26/11/2025

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

Immagine del sito
The AGI Revolution: How Mark Gubrud’s Term Changed Tech Forever
Di Redazione RHC - 25/11/2025

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...

Code as we knew it is dead! Artificial Intelligence writes the future.

Since 2013, the IEEE has published an annual interactive ranking of the most popular programming languages . However, traditional methods of measuring...
Redazione RHC - 25/09/2025 - 11:21

Cryptocurrencies, ransomware, and hamburgers: the fatal combo for Scattered Spider

The U.S. Department of Justice and British police have charged Talha Jubair, 19, a resident of East London, who investigators believe is a key member ...
Redazione RHC - 25/09/2025 - 11:02

Blade Runner Already Predicted Deepfake! Cyber Lessons from Film Classics

“ Art is a mirror that reflects the soul of the beholder.” This quote, which captures the essence of our experience with cinema, takes on crucial sign...
Daniela Farina - 25/09/2025 - 09:00

The freebie party is over! Open source infrastructure is at risk and needs funding.

An open letter signed by major open source foundations has raised the alarm about the future of the infrastructure that supports modern software devel...
Redazione RHC - 25/09/2025 - 07:47

Zero-Day Vulnerabilities Found in Cisco IOS and IOS XE: Urgent Updates

Cisco has disclosed a zero-day vulnerability, tracked as CVE-2025-20352, in its widely used IOS and IOS XE software; this vulnerability appears to be ...
Redazione RHC - 25/09/2025 - 07:31

Artificial Intelligence: A Double-Edged Sword in Digital Security

Artificial intelligence is increasingly being described as a double-edged sword, capable of offering enormous advantages but also opening new avenues ...
Redazione RHC - 25/09/2025 - 07:04

Code as we knew it is dead! Artificial Intelligence writes the future.

- September 24th, 2025

Since 2013, the IEEE has published an annual interactive ranking of the most popular programming languages . However, traditional methods of measuring popularity may be losing their meaning today, due...

Facebook Linkedin X

Cryptocurrencies, ransomware, and hamburgers: the fatal combo for Scattered Spider

- September 24th, 2025

The U.S. Department of Justice and British police have charged Talha Jubair, 19, a resident of East London, who investigators believe is a key member of Scattered Spider , a...

Facebook Linkedin X

Blade Runner Already Predicted Deepfake! Cyber Lessons from Film Classics

- September 24th, 2025

“ Art is a mirror that reflects the soul of the beholder.” This quote, which captures the essence of our experience with cinema, takes on crucial significance when discussing cybersecurity....

Facebook Linkedin X

The freebie party is over! Open source infrastructure is at risk and needs funding.

- September 24th, 2025

An open letter signed by major open source foundations has raised the alarm about the future of the infrastructure that supports modern software development. The Open Source Security Foundation (OpenSSF),...

Facebook Linkedin X

Zero-Day Vulnerabilities Found in Cisco IOS and IOS XE: Urgent Updates

- September 24th, 2025

Cisco has disclosed a zero-day vulnerability, tracked as CVE-2025-20352, in its widely used IOS and IOS XE software; this vulnerability appears to be actively exploited. This vulnerability was initially identified...

Facebook Linkedin X

Artificial Intelligence: A Double-Edged Sword in Digital Security

- September 24th, 2025

Artificial intelligence is increasingly being described as a double-edged sword, capable of offering enormous advantages but also opening new avenues for digital crime. During the " TRUST AICS - 2025"...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE