Red Hot Cyber. The Cybersecurity Blog
Featured Articles

In today’s environment, securing a network requires much more than setting a complex password. A cyber attack against a wireless network follows a structured path that evolves from passive monitorin...

Post 462 on Durov’s official channel immediately went into “scream mode”: “ The end of the free internet. The free internet is becoming a tool of control .” No birthday wishes. Durov explain...

Security researchers have discovered a sophisticated exploit campaign that leverages a private out-of-band application security testing (OAST) service hosted on Google Cloud infrastructure. The campai...

The underground cybercrime market continues to evolve rapidly, fueled by specialized groups designing and selling tools for increasingly sophisticated digital scams. Among these, a particularly active...

American aviation and defense components manufacturer ADC Aerospace has found itself in the spotlight due to a possible cyber attack by the Play ransomware group, which appeared on their blog where cr...
ToddyCat APT Group Targets Microsoft 365 Email Security
Tor Boosts Security with Counter Galois Onion CGO Encryption
WormGPT 4: AI-Powered Cybercrime Tools on the Rise
EU lawmakers push for Microsoft alternative to boost tech sovereignty
Investment Scam Alert: How to Avoid Losing Thousands
Trump Launches Genesis AI Mission to Revolutionize US Science

ToddyCat APT Group Targets Microsoft 365 Email Security
Redazione RHC - November 26th, 2025
Email security continues to be one of the most critical points in modern cyber attacks. While compromising a Windows domain is already a success for a malicious actor, gaining access...

Tor Boosts Security with Counter Galois Onion CGO Encryption
Redazione RHC - November 26th, 2025
The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to...

WormGPT 4: AI-Powered Cybercrime Tools on the Rise
Redazione RHC - November 25th, 2025
Cybercriminals no longer need to convince ChatGPT or Claude Code to write malware or data-stealing scripts. A whole class of specialized language models, specifically designed for attacks, already exists. One...

EU lawmakers push for Microsoft alternative to boost tech sovereignty
Redazione RHC - November 25th, 2025
A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns...

Investment Scam Alert: How to Avoid Losing Thousands
Redazione RHC - November 25th, 2025
Hi everyone... my name is Marco, I'm 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of...

Trump Launches Genesis AI Mission to Revolutionize US Science
Redazione RHC - November 25th, 2025
US President Donald Trump signed an executive order, " Launching the Genesis Mission," establishing a national program for the use of artificial intelligence in science. The document was published on...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

