Red Hot Cyber. The Cybersecurity Blog
29,000 Exchange servers at risk. The exploit for CVE-2025-53786 is under exploitation.
29,000 Exchange servers are vulnerable to CVE-2025-53786, which allows attackers to move within Microsoft cloud environments, potentially leading to complete domain compromise. CVE-2025-53786 allows a...
No Tariffs for 90 Days! China and the US Reach a Temporary Economic Agreement
The Government of the People’s Republic of China (“China”) and the Government of the United States of America (“USA”), according to a report by Beijing-based Xinhua ...
New 7-Zip flaw: Symbolic links turn extraction into a hack
A recently discovered security flaw in the popular file compression software 7-Zip has raised considerable concern within the security community. All versions of 7-Zip prior to 25.01 are affected by t...
James Cameron: AI can cause devastation like Skynet and Terminator
“The Skynet military defense system will go live on August 4, 1997. It will begin to self-educate, learning at an exponential rate, and will become self-aware at 2:14 a.m. on August 29. Panicki...
HTTP/1.1 Must Die! Critical vulnerabilities put millions of websites at risk.
A critical security flaw in HTTP/1.1 has been disclosed by security experts, highlighting a threat that has continued to impact web infrastructure for more than six years, potentially impacting millio...
A new Privilege Escalation (PE) technique allows UAC bypass on Windows
A recent discovery has uncovered a sophisticated technique that bypasses Windows User Account Control (UAC), allowing privilege escalation without user intervention through the use of the private font...
Discovering the Deep Web and Dark Web: The Ultimate Guide
There has been a lot of talk for some years now about the deep web and the dark web, and many have wondered: but what exactly does this mean? The dark web is often associated with shady and criminal a...
New Critical Vulnerability Discovered in Microsoft Exchange Server: CISA Warns
A critical security flaw has been discovered in hybrid deployments of Microsoft Exchange Server. This vulnerability (CWE-287) allows attackers with local administrative access to escalate their privil...
Critical Bugs on NVIDIA Triton Allow Attackers to Compromise and Steal AI Model
Critical vulnerabilities have been discovered in NVIDIA’s Triton Inference Server, threatening the security of AI infrastructure on Windows and Linux. The open-source solution is designed for l...
Malware disguises itself as an innocent photo on Dropbox. APT37’s steganographic strategy
Specialists at the Genians Security Center have discovered an improved version of the RoKRAT malware, associated with the North Korean APT37 group. The new version is distinguished by an unusual way o...
Featured Articles

29,000 Exchange servers are vulnerable to CVE-2025-53786, which allows attackers to move within Microsoft cloud environments, potentially leading to complete domain compromise. CVE-2025-53786 allows a...

The Government of the People’s Republic of China (“China”) and the Government of the United States of America (“USA”), according to a report by Beijing-based Xinhua ...

A recently discovered security flaw in the popular file compression software 7-Zip has raised considerable concern within the security community. All versions of 7-Zip prior to 25.01 are affected by t...

“The Skynet military defense system will go live on August 4, 1997. It will begin to self-educate, learning at an exponential rate, and will become self-aware at 2:14 a.m. on August 29. Panicki...

A critical security flaw in HTTP/1.1 has been disclosed by security experts, highlighting a threat that has continued to impact web infrastructure for more than six years, potentially impacting millio...

As expected, the WinRAR bug has become a devastating weapon for cyber criminals
As expected, the infamous WinRAR bug is now being actively exploited by attackers on a large scale, given the software’s widespread use and popularity. ESET experts have reported that the recently patched WinRAR vulnerability (CVE-2025-8088) was used as a zero-day

No Tariffs for 90 Days! China and the US Reach a Temporary Economic Agreement
The Government of the People’s Republic of China (“China”) and the Government of the United States of America (“USA”), according to a report by Beijing-based Xinhua news agency on August 12, and based on the China-US Joint Statement on the

Toward Skynet: Johns Hopkins University Improves War Simulations with Artificial Intelligence
Johns Hopkins University in Maryland is preparing to upgrade its AI-powered wargaming tools to help the Pentagon identify adversaries’ weaknesses in real-world conflicts. The work, conducted at the university’s Applied Physics Laboratory (APL), involves upgrading two systems, Generative Wargaming (GenWar)

Microsoft Sued in California for Ending Windows 10 Support
A lawsuit has been filed in California against Microsoft, accusing it of prematurely ending support for Windows 10 and forcing users to purchase new devices. The plaintiff, San Diego resident Lawrence Klein, claims that the decision to stop security updates

How tablet-wielding monkeys reveal the secrets of our smartphone obsession
Why can’t we tear ourselves away from our screens, even when we’ve found what we’re looking for? Why do we keep mindlessly scrolling through our feeds while time flies by? Scientists are searching for answers to these questions, and perhaps

Malware Hidden in SVG Images on Adult Sites: A New Trojan Hiding Scheme
A new scheme for distributing malicious code disguised as .svg images has been discovered on dozens of foreign adult content sites. As Malwarebytes experts discovered , attackers embed obfuscated JavaScript code in such files, which, when clicked, launch a hidden

Critical RCE vulnerability in Microsoft Teams: Urgent update needed
Redazione RHC - August 13th, 2025
As part of the August 2025 Patch Tuesday security updates, a critical Remote Code Execution (RCE) vulnerability in Microsoft's Teams collaboration software has been patched. The critical flaw, tracked as...

29,000 Exchange servers at risk. The exploit for CVE-2025-53786 is under exploitation.
Redazione RHC - August 13th, 2025
29,000 Exchange servers are vulnerable to CVE-2025-53786, which allows attackers to move within Microsoft cloud environments, potentially leading to complete domain compromise. CVE-2025-53786 allows attackers who have already gained administrative...

Vulnerability in a car dealership’s online login system: Researcher finds security flaws
Redazione RHC - August 12th, 2025
A vulnerability was discovered in the online dealership login system of one of the world's largest automakers—all it took was a little digging into the page's code. Security researcher Eaton...

Vulnerability in car dealership online login system: Researcher finds security flaws
Redazione RHC - August 12th, 2025
A vulnerability has been discovered in the online login system for dealerships at one of the world's largest car manufacturers: all it took was a little digging into the page's...
Sign up for the newsletter