Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
320×100
Redhotcyber Banner Sito 970x120px Uscita 101125

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
WhatsApp Blocked in Russia: Messaging App Faces Crackdown
Di Redazione RHC - 28/11/2025

The Russian Federation’s Roskomnadzor has announced that it continues to impose systematic restrictions on the messaging app WhatsApp due to violations of Russian law. According to the agency, the s...

Immagine del sito
Shai-Hulud Worm Spreads Beyond npm, Attacks Maven
Di Redazione RHC - 28/11/2025

The Shai-Hulud worm has spread beyond the npm ecosystem and was discovered in Maven . Socket specialists noticed an infected package on Maven Central containing the same malicious components used in t...

Immagine del sito
11.7% of jobs could be replaced by artificial intelligence
Di Redazione RHC - 28/11/2025

Artificial intelligence is currently capable of performing work equivalent to 11.7% of US employment . And not just in theory: in terms of monetary value, this value is already comparable to the salar...

Immagine del sito
Tor Boosts Security with Counter Galois Onion CGO Encryption
Di Redazione RHC - 27/11/2025

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

Immagine del sito
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Di Redazione RHC - 26/11/2025

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Italy and Adult Sites: The Country Where Entry Is Forbidden… But If You Click Yes, It’s Okay

From November 12, 2025, AGCOM reported that in line with art. 13-bis of the Caivano decree (dl123/2023) , 47 adult websites accessible from Italy woul...
Redazione RHC - 13/11/2025 - 07:32

Top Malware: Flame, the modular “spy” malware targeting the Middle East.

Flame, (also known as Flamer, sKyWIper, Skywiper), is a modular computer malware discovered in 2012 that attacked Middle Eastern target computers runn...
Massimiliano Brolli - 12/11/2025 - 22:27

Slammer, the first worm to use a bug that hasn’t been fixed for six months.

Many years have passed since the SQL Slammer worm spread uncontrollably on January 25, 2003. It was one of the fastest-spreading malware in history , ...
Redazione RHC - 12/11/2025 - 22:24

The Story of the First Keylogger: How Hidden Keyboard Control Came to Be

We all know Bruce Schneier , a renowned cryptography and computer security expert, member of the board of directors of the International Association f...
Redazione RHC - 12/11/2025 - 22:19

A Brief History of Malware: The Evolution of the Species from Its Origins to the Present Day

At first we talked about “viruses” , then “worms” appeared, followed by “macro viruses”. These were soon joined by other types of hostile software suc...
Redazione RHC - 12/11/2025 - 22:17

What Are Large Language Models? Behind the Scenes of Artificial Intelligence

In the rapidly evolving world of artificial intelligence (AI), one term has emerged with increasing importance: Language Model, especially large langu...
Marcello Politi - 12/11/2025 - 22:11
1 22 23 24 25 26 258

Italy and Adult Sites: The Country Where Entry Is Forbidden… But If You Click Yes, It’s Okay

- November 12th, 2025

From November 12, 2025, AGCOM reported that in line with art. 13-bis of the Caivano decree (dl123/2023) , 47 adult websites accessible from Italy would have to introduce an identity...

Facebook Linkedin X

Top Malware: Flame, the modular “spy” malware targeting the Middle East.

- November 11th, 2025

Flame, (also known as Flamer, sKyWIper, Skywiper), is a modular computer malware discovered in 2012 that attacked Middle Eastern target computers running the Microsoft Windows operating system. The program's primary...

Facebook Linkedin X

Slammer, the first worm to use a bug that hasn’t been fixed for six months.

- November 11th, 2025

Many years have passed since the SQL Slammer worm spread uncontrollably on January 25, 2003. It was one of the fastest-spreading malware in history , and with this article we...

Facebook Linkedin X

The Story of the First Keylogger: How Hidden Keyboard Control Came to Be

- November 11th, 2025

We all know Bruce Schneier , a renowned cryptography and computer security expert, member of the board of directors of the International Association for Cryptological Research and a renowned speaker,...

Facebook Linkedin X

A Brief History of Malware: The Evolution of the Species from Its Origins to the Present Day

- November 11th, 2025

At first we talked about “viruses” , then “worms” appeared, followed by “macro viruses”. These were soon joined by other types of hostile software such as keyloggers or lockers. At...

Facebook Linkedin X

What Are Large Language Models? Behind the Scenes of Artificial Intelligence

- November 11th, 2025

In the rapidly evolving world of artificial intelligence (AI), one term has emerged with increasing importance: Language Model, especially large language models, then called Large Language Models. You've likely already...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE