Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

29,000 Exchange servers at risk. The exploit for CVE-2025-53786 is under exploitation.
Di Redazione RHC - 13/08/2025

29,000 Exchange servers are vulnerable to CVE-2025-53786, which allows attackers to move within Microsoft cloud environments, potentially leading to complete domain compromise. CVE-2025-53786 allows a...

No Tariffs for 90 Days! China and the US Reach a Temporary Economic Agreement
Di Redazione RHC - 12/08/2025

The Government of the People’s Republic of China (“China”) and the Government of the United States of America (“USA”), according to a report by Beijing-based Xinhua ...

New 7-Zip flaw: Symbolic links turn extraction into a hack
Di Redazione RHC - 11/08/2025

A recently discovered security flaw in the popular file compression software 7-Zip has raised considerable concern within the security community. All versions of 7-Zip prior to 25.01 are affected by t...

James Cameron: AI can cause devastation like Skynet and Terminator
Di Redazione RHC - 10/08/2025

“The Skynet military defense system will go live on August 4, 1997. It will begin to self-educate, learning at an exponential rate, and will become self-aware at 2:14 a.m. on August 29. Panicki...

HTTP/1.1 Must Die! Critical vulnerabilities put millions of websites at risk.
Di Redazione RHC - 08/08/2025

A critical security flaw in HTTP/1.1 has been disclosed by security experts, highlighting a threat that has continued to impact web infrastructure for more than six years, potentially impacting millio...

Siri Sends Data to Apple Without Warning: AppleStorm Reveals the Truth

Lumia experts have published a technical investigation called AppleStorm, alleging that the Siri voice assistant transmits more user data to Apple servers than is necessary to complete tasks. In particular, attention has focused on messages dictated via Siri in the

New 7-Zip flaw: Symbolic links turn extraction into a hack

A recently discovered security flaw in the popular file compression software 7-Zip has raised considerable concern within the security community. All versions of 7-Zip prior to 25.01 are affected by this vulnerability, which results from improper handling of symbolic links

New 7-Zip flaw: Symbolic links turn extraction into a hack

A recently discovered security flaw in the popular file compression software 7-Zip has raised considerable concern within the security community. All versions of 7-Zip prior to 25.01 are affected by this vulnerability, which results from improper handling of symbolic links

As expected, the WinRAR bug has become a devastating weapon for cyber criminals

- August 12th, 2025

As expected, the infamous WinRAR bug is now being actively exploited by attackers on a large scale, given the software's widespread use and popularity. ESET experts have reported that the...

  

No Tariffs for 90 Days! China and the US Reach a Temporary Economic Agreement

- August 12th, 2025

The Government of the People's Republic of China ("China") and the Government of the United States of America ("USA"), according to a report by Beijing-based Xinhua news agency on August...

  

Toward Skynet: Johns Hopkins University Improves War Simulations with Artificial Intelligence

- August 12th, 2025

Johns Hopkins University in Maryland is preparing to upgrade its AI-powered wargaming tools to help the Pentagon identify adversaries' weaknesses in real-world conflicts. The work, conducted at the university's Applied...

  

Microsoft Sued in California for Ending Windows 10 Support

- August 12th, 2025

A lawsuit has been filed in California against Microsoft, accusing it of prematurely ending support for Windows 10 and forcing users to purchase new devices. The plaintiff, San Diego resident...

  

Sign up for the newsletter