Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The Russian Federation’s Roskomnadzor has announced that it continues to impose systematic restrictions on the messaging app WhatsApp due to violations of Russian law. According to the agency, the s...

The Shai-Hulud worm has spread beyond the npm ecosystem and was discovered in Maven . Socket specialists noticed an infected package on Maven Central containing the same malicious components used in t...

Artificial intelligence is currently capable of performing work equivalent to 11.7% of US employment . And not just in theory: in terms of monetary value, this value is already comparable to the salar...

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...
Userbox shut down and its admin arrested by Moscow police. Something is changing.
Will Bug Hunters Be Out of Work? OpenAI Introduces Aardvark, Its New Bug Fixer
The Louvre Theft: How Password Governance Can Undermine Security
Xi Jinping proposes a global organization for artificial intelligence
The Future of Society in the Age of Artificial Intelligence
When Google Indexes Even Deception! Ghost Networks Discovered by RHC That Penalize SERPs

Userbox shut down and its admin arrested by Moscow police. Something is changing.
Redazione RHC - November 2nd, 2025
In recent months, it would appear that the Russian Federation is cracking down on cybercrime, a departure from what we were used to seeing in the past , when many...

Will Bug Hunters Be Out of Work? OpenAI Introduces Aardvark, Its New Bug Fixer
Redazione RHC - November 2nd, 2025
OpenAI has unveiled Aardvark, an autonomous assistant based on the GPT-5 model , designed to automatically find and fix vulnerabilities in software code. This AI tool, dubbed a "security research...

The Louvre Theft: How Password Governance Can Undermine Security
Redazione RHC - November 2nd, 2025
"When the Key Is 'Louvre' - The Theft That Teaches How Password Governance Can Shake Even the Most Violable Fortresses" On October 19, 2025, the Louvre Museum was the scene...

Xi Jinping proposes a global organization for artificial intelligence
Redazione RHC - November 2nd, 2025
Chinese President Xi Jinping took center stage at Saturday's APEC leaders' meeting, proposing the creation of a global organization to manage artificial intelligence. Beijing is seeking to establish itself as...

The Future of Society in the Age of Artificial Intelligence
Ugo Micci - November 2nd, 2025
Today, many are wondering what impact the spread of Artificial Intelligence will have on our society. Among the most widespread concerns is the loss of millions of jobs and the...

When Google Indexes Even Deception! Ghost Networks Discovered by RHC That Penalize SERPs
Redazione RHC - November 2nd, 2025
RHC analysis of the “BHS Links” network and global Black Hat automated SEO infrastructure An internal Red Hot Cyber analysis of its domain has uncovered a global Black Hat SEO...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

