Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and...

A nearly forgotten service command has returned to prominence after being spotted in new Windows device infection patterns. For decades considered a relic of the early days of the internet, the mechan...

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI ann...
GPT-5 Hacked in 24 Hours. Experts Find Surprising Weaknesses
Did you double-click WinRAR? Congratulations! You’ve been compromised
Satellites Under Hackers’ Control: “It’s Easier to Hack Them Than to Use Satellite Weapons”
A step toward autonomous warfare. A drone can autonomously program its “brain system.”
GPT-5 is here! The billion-dollar AI that devours GPUs and makes GPT-4 look like a toy.
HTTP/1.1 Must Die! Critical vulnerabilities put millions of websites at risk.

GPT-5 Hacked in 24 Hours. Experts Find Surprising Weaknesses
Redazione RHC - August 8th, 2025
After Grok-4 was cracked in two days, GPT-5 was defeated in just 24 hours by the same researchers. Almost simultaneously, the SPLX (formerly SplxAI) testing team declared: "GPT-5 is crude...

Did you double-click WinRAR? Congratulations! You’ve been compromised
Redazione RHC - August 8th, 2025
A recently closed WinRAR vulnerability tracked under CVE-2025-8088 was exploited in targeted phishing attacks before the patch was released. The issue involved directory traversal and was only fixed in WinRAR...

Satellites Under Hackers’ Control: “It’s Easier to Hack Them Than to Use Satellite Weapons”
Redazione RHC - August 8th, 2025
At the Black Hat conference in Las Vegas, VisionSpace Technologies demonstrated that it is much easier and cheaper to disable a satellite or alter its trajectory than to use anti-satellite...

A step toward autonomous warfare. A drone can autonomously program its “brain system.”
Redazione RHC - August 8th, 2025
For the first time, it has been demonstrated that a robot can not only execute commands, but also program its own "brain system" from start to finish. This breakthrough was...

GPT-5 is here! The billion-dollar AI that devours GPUs and makes GPT-4 look like a toy.
Redazione RHC - August 8th, 2025
OpenAI has launched its new flagship model, and the message is clear: reliability, power, and a radical change in the way we interact with artificial intelligence. After years of viewing...

HTTP/1.1 Must Die! Critical vulnerabilities put millions of websites at risk.
Redazione RHC - August 7th, 2025
A critical security flaw in HTTP/1.1 has been disclosed by security experts, highlighting a threat that has continued to impact web infrastructure for more than six years, potentially impacting millions...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

