Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
TM RedHotCyber 320x100 042514
Redhotcyber Banner Sito 970x120px Uscita 101125

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
WhatsApp Blocked in Russia: Messaging App Faces Crackdown
Di Redazione RHC - 28/11/2025

The Russian Federation’s Roskomnadzor has announced that it continues to impose systematic restrictions on the messaging app WhatsApp due to violations of Russian law. According to the agency, the s...

Immagine del sito
Shai-Hulud Worm Spreads Beyond npm, Attacks Maven
Di Redazione RHC - 28/11/2025

The Shai-Hulud worm has spread beyond the npm ecosystem and was discovered in Maven . Socket specialists noticed an infected package on Maven Central containing the same malicious components used in t...

Immagine del sito
11.7% of jobs could be replaced by artificial intelligence
Di Redazione RHC - 28/11/2025

Artificial intelligence is currently capable of performing work equivalent to 11.7% of US employment . And not just in theory: in terms of monetary value, this value is already comparable to the salar...

Immagine del sito
Tor Boosts Security with Counter Galois Onion CGO Encryption
Di Redazione RHC - 27/11/2025

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

Immagine del sito
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Di Redazione RHC - 26/11/2025

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

VLC and its creator receive award for choosing freedom over millions of dollars

Whenever you come across an unknown media file or a strange link that won't open with any standard application, there's always one program that comes ...
Redazione RHC - 13/11/2025 - 21:45

What is Misevolution: The Autonomous Evolution of AI Agents, and It’s Not Always Good

Shanghai, November 11, 2025 – A new study conducted by the Shanghai Artificial Intelligence Laboratory , in collaboration with Shanghai Jiao Tong Univ...
Redazione RHC - 13/11/2025 - 21:00

Tanks are no longer needed: new wars are fought from a laptop

Author: Roberto Villani, Tanslate: Vincenzo Marcovecchio Why will the cyberg wars, indeed the cyber-guerrillas, be more and more present and involv...
Roberto Villani - 13/11/2025 - 18:45

A 0Day bug for a WordPress plugin sold for 6000 euros in the underground

On one of Russia's most popular forums for buying and selling vulnerabilities and attack tools, the thread appeared as a standard commercial ad, but t...
Redazione RHC - 13/11/2025 - 18:38

Can a cyber attack reduce a country’s GDP? In the UK, it seems so!

The British economy contracted further in September, largely due to the cyber attack on car manufacturer Jaguar Land Rover (JLR) and its forced closur...
Redazione RHC - 13/11/2025 - 17:13

Triofox Antivirus Exploited to Install Remote Access Components

Google researchers warn that hackers are exploiting a critical vulnerability in Gladinet Triofox to remotely execute code with SYSTEM privileges, bypa...
Redazione RHC - 13/11/2025 - 15:29
1 20 21 22 23 24 258

VLC and its creator receive award for choosing freedom over millions of dollars

- November 12th, 2025

Whenever you come across an unknown media file or a strange link that won't open with any standard application, there's always one program that comes to the rescue: VLC ....

Facebook Linkedin X

What is Misevolution: The Autonomous Evolution of AI Agents, and It’s Not Always Good

- November 12th, 2025

Shanghai, November 11, 2025 – A new study conducted by the Shanghai Artificial Intelligence Laboratory , in collaboration with Shanghai Jiao Tong University , Renmin University of China , and...

Facebook Linkedin X

Tanks are no longer needed: new wars are fought from a laptop

- November 12th, 2025

Author: Roberto Villani, Tanslate: Vincenzo Marcovecchio Why will the cyberg wars, indeed the cyber-guerrillas, be more and more present and involve us more and more? The short century, the 1900s...

Facebook Linkedin X

A 0Day bug for a WordPress plugin sold for 6000 euros in the underground

- November 12th, 2025

On one of Russia's most popular forums for buying and selling vulnerabilities and attack tools, the thread appeared as a standard commercial ad, but the content is anything but trivial....

Facebook Linkedin X

Can a cyber attack reduce a country’s GDP? In the UK, it seems so!

- November 12th, 2025

The British economy contracted further in September, largely due to the cyber attack on car manufacturer Jaguar Land Rover (JLR) and its forced closure. A new report from the Office...

Facebook Linkedin X

Triofox Antivirus Exploited to Install Remote Access Components

- November 12th, 2025

Google researchers warn that hackers are exploiting a critical vulnerability in Gladinet Triofox to remotely execute code with SYSTEM privileges, bypassing authentication and gaining complete control of the system. The...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE