Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...
Logitech Hit by Clop Ransomware Attack, Data Breach Exposed
Malware Uses Finger Command to Infect Windows Devices
The Future of Tech: How to Navigate the Digital World
Google Gemini 3.0 Shakes Nvidia’s AI Dominance with TPU Innovation
CISA Warns of Spyware Attacks on Mobile Messaging Apps
New ClickFix Malware Campaign Targets Windows Users with Fake Updates

Logitech Hit by Clop Ransomware Attack, Data Breach Exposed
Redazione RHC - November 25th, 2025
Logitech representatives have notified authorities of a cyberattack and a serious data breach . The notorious Clop ransomware group, which has been targeting companies for several months by exploiting a...

Malware Uses Finger Command to Infect Windows Devices
Redazione RHC - November 25th, 2025
A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet,...

The Future of Tech: How to Navigate the Digital World
Redazione RHC - November 25th, 2025
There are books that explain technology and books that make you understand why you should pause for a minute before scrolling through a feed. Il Futuro Prossimo , Sandro Sana...

Google Gemini 3.0 Shakes Nvidia’s AI Dominance with TPU Innovation
Redazione RHC - November 24th, 2025
Nvidia's dominance in the artificial intelligence (AI) sector was shaken by the acclaim for Google's "Gemini 3.0." Nvidia's stock price fell more than 2% in after-hours trading. SK Hynix, a...

CISA Warns of Spyware Attacks on Mobile Messaging Apps
Redazione RHC - November 24th, 2025
An important advisory was published on Monday by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) , warning that malicious actors are actively using commercial spyware tools and remote access...

New ClickFix Malware Campaign Targets Windows Users with Fake Updates
Redazione RHC - November 24th, 2025
Fake Windows updates have entered a new round of ClickFix campaigns, as reported by Huntress. Attackers are increasingly replacing bot controls with full-screen blue windows that simulate a system update....
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

