Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...
$20 million in zero-day exploits from broker Advanced Security Solutions
Will 2029 be the year of Q-Day? But what if the SHA1 replacement took 12 years?
Critical Downgrade Bug in Chat-GPT Leads to Jailbreak of Model
China’s Great Firewall blocks internet traffic for 74 minutes
A Criminal Hacker Sells Access to Roche Underground Servers
972 million Google Play VPN users are at risk!

$20 million in zero-day exploits from broker Advanced Security Solutions
Redazione RHC - August 21st, 2025
Advanced Security Solutions, based in the United Arab Emirates, was founded this month and is offering up to $20 million for zero-day vulnerabilities and exploits that would allow anyone to...

Will 2029 be the year of Q-Day? But what if the SHA1 replacement took 12 years?
Redazione RHC - August 21st, 2025
Security experts are increasingly talking about "Q-Day," the moment when quantum computers will be able to handle modern encryption algorithms. Predictions from major players, from IBM and Google to Gartner...

Critical Downgrade Bug in Chat-GPT Leads to Jailbreak of Model
Redazione RHC - August 21st, 2025
A critical flaw found in OpenAI's latest model, ChatGPT-5, allows attackers to bypass advanced security features through the use of simple expressions. This bug, dubbed "PROMISQROUTE" by researchers at Adversa...

China’s Great Firewall blocks internet traffic for 74 minutes
Redazione RHC - August 21st, 2025
Researchers from the Great Firewall Report team noticed that on the night of August 20, China's Great Firewall experienced a technical issue or was undergoing some type of testing. All...

A Criminal Hacker Sells Access to Roche Underground Servers
Redazione RHC - August 21st, 2025
A recent post on an underground forum has attracted the attention of cybersecurity experts. A user claimed to have sold administrative access to Roche, a pharmaceutical giant with over 100,000...

972 million Google Play VPN users are at risk!
Redazione RHC - August 21st, 2025
Citizen Lab analysts have reported that more than 20 VPN apps on the Google Play Store have serious security issues that threaten users' privacy and allow the decryption of transmitted...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

