Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
2nd Edition GlitchZone RHC 320x100 2
TM RedHotCyber 970x120 042543

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
WhatsApp Blocked in Russia: Messaging App Faces Crackdown
Di Redazione RHC - 28/11/2025

The Russian Federation’s Roskomnadzor has announced that it continues to impose systematic restrictions on the messaging app WhatsApp due to violations of Russian law. According to the agency, the s...

Immagine del sito
Shai-Hulud Worm Spreads Beyond npm, Attacks Maven
Di Redazione RHC - 28/11/2025

The Shai-Hulud worm has spread beyond the npm ecosystem and was discovered in Maven . Socket specialists noticed an infected package on Maven Central containing the same malicious components used in t...

Immagine del sito
11.7% of jobs could be replaced by artificial intelligence
Di Redazione RHC - 28/11/2025

Artificial intelligence is currently capable of performing work equivalent to 11.7% of US employment . And not just in theory: in terms of monetary value, this value is already comparable to the salar...

Immagine del sito
Tor Boosts Security with Counter Galois Onion CGO Encryption
Di Redazione RHC - 27/11/2025

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

Immagine del sito
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Di Redazione RHC - 26/11/2025

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

The Louvre was deceived by two Belgian pranksters! They hung their painting next to the Mona Lisa.

Louvre security is under fire again after pranksters managed to trick guards and hang their painting in the same room as the Mona Lisa. Belgian duo Ne...
Redazione RHC - 16/11/2025 - 16:06

Are Black Hackers Demanding Ransom? Checkout.com Responds: We Fund Those Hunting You

Payment service Checkout.com was the victim of an extortion attempt: the ShinyHunters group claimed to have accessed company data and demanded a ranso...
Redazione RHC - 16/11/2025 - 12:15

Trump, Hong Kong, and the Global Rush to Regulate Cryptocurrencies

Throughout 2024, there were several signs of a shift in the relationship between institutions and cryptocurrencies. On March 6, President Donald Trump...
Redazione RHC - 16/11/2025 - 12:14

Sam Altman and her husband Oliver and the dream of genetically modified children

The pursuit of immortality is a pervasive obsession in Silicon Valley. Likewise, the idea of perfecting children through genetic modification is anoth...
Redazione RHC - 16/11/2025 - 11:58

The stress of social network algorithms causes burnout in creators

A new research project has shown that the online content industry, which has offered people thousands of new ways to earn money, is also placing signi...
Redazione RHC - 16/11/2025 - 08:53

Discovering Tor Browser: The Digital Fortress for Online Privacy

Tor Browser (short for The Onion Router) is a free, open-source web browser designed specifically to protect users' online privacy. Using a network of...
Raffaela Crisci - 15/11/2025 - 16:12
1 14 15 16 17 18 258

The Louvre was deceived by two Belgian pranksters! They hung their painting next to the Mona Lisa.

- November 15th, 2025

Louvre security is under fire again after pranksters managed to trick guards and hang their painting in the same room as the Mona Lisa. Belgian duo Neel and Senne gained...

Facebook Linkedin X

Are Black Hackers Demanding Ransom? Checkout.com Responds: We Fund Those Hunting You

- November 15th, 2025

Payment service Checkout.com was the victim of an extortion attempt: the ShinyHunters group claimed to have accessed company data and demanded a ransom. An investigation revealed that the attackers had...

Facebook Linkedin X

Trump, Hong Kong, and the Global Rush to Regulate Cryptocurrencies

- November 15th, 2025

Throughout 2024, there were several signs of a shift in the relationship between institutions and cryptocurrencies. On March 6, President Donald Trump signed an executive order establishing a "Bitcoin Strategic...

Facebook Linkedin X

Sam Altman and her husband Oliver and the dream of genetically modified children

- November 15th, 2025

The pursuit of immortality is a pervasive obsession in Silicon Valley. Likewise, the idea of perfecting children through genetic modification is another. Sam Altman, the man who brought artificial intelligence...

Facebook Linkedin X

The stress of social network algorithms causes burnout in creators

- November 15th, 2025

A new research project has shown that the online content industry, which has offered people thousands of new ways to earn money, is also placing significant mental stress on its...

Facebook Linkedin X

Discovering Tor Browser: The Digital Fortress for Online Privacy

- November 14th, 2025

Tor Browser (short for The Onion Router) is a free, open-source web browser designed specifically to protect users' online privacy. Using a network of servers distributed around the world, Tor...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE