Red Hot Cyber. The Cybersecurity Blog
Featured Articles

MITRE has released its ranking of the 25 most dangerous software vulnerabilities predicted for 2025, based on data collected through the National Vulnerability Database. These vulnerabilities were ide...

The prospect of a four-day workweek, with a resulting three-day long weekend, may not be far off. This is according to Christopher A. Pissarides , a British-Cypriot economist and Nobel Prize winner, w...

The recent 2025.4 release of Kali Linux has been made available to the public, introducing significant improvements to the GNOME, KDE, and Xfce desktop environments . From now on, Wayland will be the ...

An alleged database containing sensitive information on 18 million U.S. citizens over 65 has appeared for sale on a popular dark web forum. The advertiser, who uses the pseudonym “Frenshyny,” clai...

A recent study by Datadog Security Labs reveals an ongoing operation targeting organizations using Microsoft 365 and Okta for single sign-on (SSO) authentication. This operation uses sophisticated tec...
150 Malicious Firefox Extensions Stole $1 Million in Cryptocurrency
Over 60s, Under Fire! Hackers Stole $700 Million from Seniors
EDRs are still going offline! Threats are growing with EDRKillShifter’s offspring.
GPT-5 Hacked in 24 Hours. Experts Find Surprising Weaknesses
Did you double-click WinRAR? Congratulations! You’ve been compromised
Satellites Under Hackers’ Control: “It’s Easier to Hack Them Than to Use Satellite Weapons”

150 Malicious Firefox Extensions Stole $1 Million in Cryptocurrency
Redazione RHC - August 9th, 2025
Koi Security analysts have discovered the GreedyBear malware campaign active in the Mozilla add-on store. 150 malicious Firefox extensions stole over $1 million worth of cryptocurrency from users. The fraudulent...

Over 60s, Under Fire! Hackers Stole $700 Million from Seniors
Redazione RHC - August 9th, 2025
Americans over 60 lost a staggering $700 million to online fraud in 2024, the highest figure ever recorded by the Federal Trade Commission (FTC). The new Consumer Protection Data Spotlight...

EDRs are still going offline! Threats are growing with EDRKillShifter’s offspring.
Redazione RHC - August 9th, 2025
A new tool for disabling EDR systems has emerged in the cybercriminal community, which Sophos experts believe to be an extension of the EDRKillShifter utility. Its use has already been...

GPT-5 Hacked in 24 Hours. Experts Find Surprising Weaknesses
Redazione RHC - August 8th, 2025
After Grok-4 was cracked in two days, GPT-5 was defeated in just 24 hours by the same researchers. Almost simultaneously, the SPLX (formerly SplxAI) testing team declared: "GPT-5 is crude...

Did you double-click WinRAR? Congratulations! You’ve been compromised
Redazione RHC - August 8th, 2025
A recently closed WinRAR vulnerability tracked under CVE-2025-8088 was exploited in targeted phishing attacks before the patch was released. The issue involved directory traversal and was only fixed in WinRAR...

Satellites Under Hackers’ Control: “It’s Easier to Hack Them Than to Use Satellite Weapons”
Redazione RHC - August 8th, 2025
At the Black Hat conference in Las Vegas, VisionSpace Technologies demonstrated that it is much easier and cheaper to disable a satellite or alter its trajectory than to use anti-satellite...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

