Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...
New 7-Zip flaw: Symbolic links turn extraction into a hack
A 60-year-old man was hospitalized for three weeks following ChatGPT’s medical advice.
New 7-Zip flaw: Symbolic links turn extraction into a hack
BadUSB. Webcam Spyware: The Lenovo Bug Threatening Millions of PCs
Win-DoS Epidemic: New DoS and DDoS Attacks Start with Microsoft Windows
ElectroSim: The Ethical Hackers’ Virtual Environment for Studying OT/ICS Security Flaws

New 7-Zip flaw: Symbolic links turn extraction into a hack
Redazione RHC - August 10th, 2025
A recently discovered security flaw in the popular file compression software 7-Zip has raised considerable concern within the security community. All versions of 7-Zip prior to 25.01 are affected by...

A 60-year-old man was hospitalized for three weeks following ChatGPT’s medical advice.
Redazione RHC - August 10th, 2025
Blindly relying on ChatGPT for fitness advice or meal plans can be risky. Even health recommendations provided by artificial intelligence can be life-threatening. A recent case demonstrates this: a 60-year-old...

New 7-Zip flaw: Symbolic links turn extraction into a hack
Redazione RHC - August 10th, 2025
A recently discovered security flaw in the popular file compression software 7-Zip has raised considerable concern within the security community. All versions of 7-Zip prior to 25.01 are affected by...

BadUSB. Webcam Spyware: The Lenovo Bug Threatening Millions of PCs
Redazione RHC - August 10th, 2025
Researchers at Eclypsium have identified dangerous vulnerabilities in the Lenovo 510 FHD and Lenovo Performance FHD webcams that can be transformed into BadUSB attack devices. The issue, dubbed BadCam, was...

Win-DoS Epidemic: New DoS and DDoS Attacks Start with Microsoft Windows
Redazione RHC - August 10th, 2025
During the security conference DEF CON33, a team of industry specialists, Yair and Shahak Morag, from SafeBreach Labs, presented a novel category of denial-of-service (DoS) attacks they've dubbed the "Win-DoS...

ElectroSim: The Ethical Hackers’ Virtual Environment for Studying OT/ICS Security Flaws
Redazione RHC - August 10th, 2025
ElectroSim Industrialis an educational virtual machine that simulates the operating platform of a typical electric utility, combining consumption control, industrial monitoring, and essential cybersecurity concepts. The environment is designed for...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

