Red Hot Cyber. The Cybersecurity Blog
Featured Articles

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...

Anthropic has released Claude Opus 4.5 , its new flagship model, which the company says is the most powerful version yet and ranks at the top of the class for practical programming, agent-based produc...
Malware Uses Finger Command to Infect Windows Devices
The Future of Tech: How to Navigate the Digital World
Google Gemini 3.0 Shakes Nvidia’s AI Dominance with TPU Innovation
CISA Warns of Spyware Attacks on Mobile Messaging Apps
New ClickFix Malware Campaign Targets Windows Users with Fake Updates
GDPR Data Breach: Email Errors and Consequences

Malware Uses Finger Command to Infect Windows Devices
Redazione RHC - November 26th, 2025
A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet,...

The Future of Tech: How to Navigate the Digital World
Redazione RHC - November 26th, 2025
There are books that explain technology and books that make you understand why you should pause for a minute before scrolling through a feed. Il Futuro Prossimo , Sandro Sana...

Google Gemini 3.0 Shakes Nvidia’s AI Dominance with TPU Innovation
Redazione RHC - November 25th, 2025
Nvidia's dominance in the artificial intelligence (AI) sector was shaken by the acclaim for Google's "Gemini 3.0." Nvidia's stock price fell more than 2% in after-hours trading. SK Hynix, a...

CISA Warns of Spyware Attacks on Mobile Messaging Apps
Redazione RHC - November 25th, 2025
An important advisory was published on Monday by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) , warning that malicious actors are actively using commercial spyware tools and remote access...

New ClickFix Malware Campaign Targets Windows Users with Fake Updates
Redazione RHC - November 25th, 2025
Fake Windows updates have entered a new round of ClickFix campaigns, as reported by Huntress. Attackers are increasingly replacing bot controls with full-screen blue windows that simulate a system update....

GDPR Data Breach: Email Errors and Consequences
Stefano Gazzella - November 25th, 2025
Like it or not, sending an email to the wrong recipient constitutes a personal data breach under the GDPR. This obviously applies if the email contains personal data or if...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

