Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...
Russian Sandworm hackers target Ukrainian grain industry with wiper malware
Highly advanced, adaptive malware uses AI to confuse security defenses
An AI extension for VS Code turns your PC into a digital hostage
The Louvre’s security myth crumbles! Between audits, ridiculous passwords, and outdated cameras.
Double-dealing: employees of a company that resolved ransomware attacks were launching them themselves
Cybersecurity is democratic: the same virus hits multinationals and housewives

Russian Sandworm hackers target Ukrainian grain industry with wiper malware
Redazione RHC - November 6th, 2025
Russian Sandworm hackers use wiper malware against the Ukrainian grain industry. Ukraine's grain industry has become the latest target of the infamous, state-backed Russian hacking unit Sandworm, as part of...

Highly advanced, adaptive malware uses AI to confuse security defenses
Redazione RHC - November 6th, 2025
Based on a recent analysis by the Google Threat Intelligence Group (GTIG), a shift has been identified among threat actors over the past year. Continuous improvements in the underground for...

An AI extension for VS Code turns your PC into a digital hostage
Redazione RHC - November 6th, 2025
Secure Annex researchers found a malicious extension in the Visual Studio Code Marketplace extension catalog for VS Code that features basic ransomware functionality. The malware was apparently written using Vibe...

The Louvre’s security myth crumbles! Between audits, ridiculous passwords, and outdated cameras.
Redazione RHC - November 6th, 2025
The recent theft at the Louvre Museum, located in the heart of Paris, has shocked not only the art world but also the cybersecurity world. On the night of October...

Double-dealing: employees of a company that resolved ransomware attacks were launching them themselves
Redazione RHC - November 6th, 2025
Three former DigitalMint employees, who investigated ransomware incidents and negotiated with ransomware groups, are accused of hacking into the networks of five American companies. According to the U.S. Department of...

Cybersecurity is democratic: the same virus hits multinationals and housewives
Fabrizio Saviano - November 6th, 2025
The same malware that yesterday blocked the servers of a major bank today encrypts Mrs. Pina's photos on her home PC. As? With an innocuous WhatsApp message, sent by his...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

