Red Hot Cyber. The Cybersecurity Blog
29,000 Exchange servers at risk. The exploit for CVE-2025-53786 is under exploitation.
29,000 Exchange servers are vulnerable to CVE-2025-53786, which allows attackers to move within Microsoft cloud environments, potentially leading to complete domain compromise. CVE-2025-53786 allows a...
No Tariffs for 90 Days! China and the US Reach a Temporary Economic Agreement
The Government of the People’s Republic of China (“China”) and the Government of the United States of America (“USA”), according to a report by Beijing-based Xinhua ...
New 7-Zip flaw: Symbolic links turn extraction into a hack
A recently discovered security flaw in the popular file compression software 7-Zip has raised considerable concern within the security community. All versions of 7-Zip prior to 25.01 are affected by t...
James Cameron: AI can cause devastation like Skynet and Terminator
“The Skynet military defense system will go live on August 4, 1997. It will begin to self-educate, learning at an exponential rate, and will become self-aware at 2:14 a.m. on August 29. Panicki...
HTTP/1.1 Must Die! Critical vulnerabilities put millions of websites at risk.
A critical security flaw in HTTP/1.1 has been disclosed by security experts, highlighting a threat that has continued to impact web infrastructure for more than six years, potentially impacting millio...
A new Privilege Escalation (PE) technique allows UAC bypass on Windows
A recent discovery has uncovered a sophisticated technique that bypasses Windows User Account Control (UAC), allowing privilege escalation without user intervention through the use of the private font...
Discovering the Deep Web and Dark Web: The Ultimate Guide
There has been a lot of talk for some years now about the deep web and the dark web, and many have wondered: but what exactly does this mean? The dark web is often associated with shady and criminal a...
New Critical Vulnerability Discovered in Microsoft Exchange Server: CISA Warns
A critical security flaw has been discovered in hybrid deployments of Microsoft Exchange Server. This vulnerability (CWE-287) allows attackers with local administrative access to escalate their privil...
Critical Bugs on NVIDIA Triton Allow Attackers to Compromise and Steal AI Model
Critical vulnerabilities have been discovered in NVIDIA’s Triton Inference Server, threatening the security of AI infrastructure on Windows and Linux. The open-source solution is designed for l...
Malware disguises itself as an innocent photo on Dropbox. APT37’s steganographic strategy
Specialists at the Genians Security Center have discovered an improved version of the RoKRAT malware, associated with the North Korean APT37 group. The new version is distinguished by an unusual way o...
Featured Articles

29,000 Exchange servers are vulnerable to CVE-2025-53786, which allows attackers to move within Microsoft cloud environments, potentially leading to complete domain compromise. CVE-2025-53786 allows a...

The Government of the People’s Republic of China (“China”) and the Government of the United States of America (“USA”), according to a report by Beijing-based Xinhua ...

A recently discovered security flaw in the popular file compression software 7-Zip has raised considerable concern within the security community. All versions of 7-Zip prior to 25.01 are affected by t...

“The Skynet military defense system will go live on August 4, 1997. It will begin to self-educate, learning at an exponential rate, and will become self-aware at 2:14 a.m. on August 29. Panicki...

A critical security flaw in HTTP/1.1 has been disclosed by security experts, highlighting a threat that has continued to impact web infrastructure for more than six years, potentially impacting millio...

GitHub CEO: Programmers Who Don’t Embrace AI Will Be Done
The common message from software development giants is this: Programming is transforming from manual labor to managing digital agents. GitHub CEO Thomas Domke has issued a stern warning to the global tech industry: developers who don’t embrace artificial intelligence should

GPT-OSS is released: OpenAI’s new open-source model that works without an internet connection
This week, OpenAI unveiled a long-awaited open language model called gpt-oss. Its key selling point is the ability to run locally on your computer, including Macs with Apple Silicon processors. Here’s how it works and what to expect. This was

New Critical Vulnerability Discovered in Microsoft Exchange Server: CISA Warns
A critical security flaw has been discovered in hybrid deployments of Microsoft Exchange Server. This vulnerability (CWE-287) allows attackers with local administrative access to escalate their privileges within cloud environments. Although the complexity of the attack is considered high, attackers

Artificial Intelligence Doesn’t Reduce Costs, It Increases Them! From Silicon Valley, the New Reality
The wave of layoffs in Silicon Valley continues in 2025. Silicon Valley CEOs are shouting that artificial intelligence will bring a new revolution in efficiency and will also be the light of the future for reshaping productivity. However, when this

Two Android Vulnerabilities Actively Exploited: Google Releases Critical Patches
Google has released the August security updates for Android, which contain patches for six vulnerabilities. Two of these are related to Qualcomm components and have already been exploited in targeted attacks. The vulnerabilities under attack have been identified with the

Adobe Experience Manager Forms under attack! Urgent patch for a score 10 RCE zero-day bug.
On August 5, 2025, Adobe released an urgent security update for Adobe Experience Manager (AEM) Forms on Java Enterprise Edition (JEE), addressing two serious vulnerabilities: CVE-2025-54253 and CVE-2025-54254. The most serious, CVE-2025-54253, is a zero-day that was actively exploited in

Satellites Under Hackers’ Control: “It’s Easier to Hack Them Than to Use Satellite Weapons”
Redazione RHC - August 9th, 2025
At the Black Hat conference in Las Vegas, VisionSpace Technologies demonstrated that it is much easier and cheaper to disable a satellite or alter its trajectory than to use anti-satellite...

A step toward autonomous warfare. A drone can autonomously program its “brain system.”
Redazione RHC - August 9th, 2025
For the first time, it has been demonstrated that a robot can not only execute commands, but also program its own "brain system" from start to finish. This breakthrough was...

GPT-5 is here! The billion-dollar AI that devours GPUs and makes GPT-4 look like a toy.
Redazione RHC - August 9th, 2025
OpenAI has launched its new flagship model, and the message is clear: reliability, power, and a radical change in the way we interact with artificial intelligence. After years of viewing...

HTTP/1.1 Must Die! Critical vulnerabilities put millions of websites at risk.
Redazione RHC - August 8th, 2025
A critical security flaw in HTTP/1.1 has been disclosed by security experts, highlighting a threat that has continued to impact web infrastructure for more than six years, potentially impacting millions...
Sign up for the newsletter