Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
2nd Edition GlitchZone RHC 320x100 2
2nd Edition GlitchZone RHC 970x120 2

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Tor Boosts Security with Counter Galois Onion CGO Encryption
Di Redazione RHC - 27/11/2025

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

Immagine del sito
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Di Redazione RHC - 26/11/2025

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Immagine del sito
Investment Scam Alert: How to Avoid Losing Thousands
Di Redazione RHC - 26/11/2025

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

Immagine del sito
Malware Uses Finger Command to Infect Windows Devices
Di Redazione RHC - 26/11/2025

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

Immagine del sito
The AGI Revolution: How Mark Gubrud’s Term Changed Tech Forever
Di Redazione RHC - 25/11/2025

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...

Tanks are no longer needed: new wars are fought from a laptop

Author: Roberto Villani, Tanslate: Vincenzo Marcovecchio Why will the cyberg wars, indeed the cyber-guerrillas, be more and more present and involv...
Roberto Villani - 13/11/2025 - 18:45

A 0Day bug for a WordPress plugin sold for 6000 euros in the underground

On one of Russia's most popular forums for buying and selling vulnerabilities and attack tools, the thread appeared as a standard commercial ad, but t...
Redazione RHC - 13/11/2025 - 18:38

Can a cyber attack reduce a country’s GDP? In the UK, it seems so!

The British economy contracted further in September, largely due to the cyber attack on car manufacturer Jaguar Land Rover (JLR) and its forced closur...
Redazione RHC - 13/11/2025 - 17:13

Triofox Antivirus Exploited to Install Remote Access Components

Google researchers warn that hackers are exploiting a critical vulnerability in Gladinet Triofox to remotely execute code with SYSTEM privileges, bypa...
Redazione RHC - 13/11/2025 - 15:29

BazarLoader: The precursor malware used by RaaS gangs

BazarLoader (sometimes referred to as BazaLoader ) is a " precursor malware " that provides initial backdoor access to an infected Windows host. Once ...
Redazione RHC - 13/11/2025 - 14:07

Emotet: The horse returns to a gallop more dangerous than ever

Emotet is a malware of the Trojan Horse category, which began its first spread in 2014 which brought it to the podium among the main cyber threats of ...
Redazione RHC - 13/11/2025 - 13:59
1 19 20 21 22 23 257

Tanks are no longer needed: new wars are fought from a laptop

- November 12th, 2025

Author: Roberto Villani, Tanslate: Vincenzo Marcovecchio Why will the cyberg wars, indeed the cyber-guerrillas, be more and more present and involve us more and more? The short century, the 1900s...

Facebook Linkedin X

A 0Day bug for a WordPress plugin sold for 6000 euros in the underground

- November 12th, 2025

On one of Russia's most popular forums for buying and selling vulnerabilities and attack tools, the thread appeared as a standard commercial ad, but the content is anything but trivial....

Facebook Linkedin X

Can a cyber attack reduce a country’s GDP? In the UK, it seems so!

- November 12th, 2025

The British economy contracted further in September, largely due to the cyber attack on car manufacturer Jaguar Land Rover (JLR) and its forced closure. A new report from the Office...

Facebook Linkedin X

Triofox Antivirus Exploited to Install Remote Access Components

- November 12th, 2025

Google researchers warn that hackers are exploiting a critical vulnerability in Gladinet Triofox to remotely execute code with SYSTEM privileges, bypassing authentication and gaining complete control of the system. The...

Facebook Linkedin X

BazarLoader: The precursor malware used by RaaS gangs

- November 12th, 2025

BazarLoader (sometimes referred to as BazaLoader ) is a " precursor malware " that provides initial backdoor access to an infected Windows host. Once a client is infected, criminals use...

Facebook Linkedin X

Emotet: The horse returns to a gallop more dangerous than ever

- November 12th, 2025

Emotet is a malware of the Trojan Horse category, which began its first spread in 2014 which brought it to the podium among the main cyber threats of the decade...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE