Red Hot Cyber. The Cybersecurity Blog
29,000 Exchange servers at risk. The exploit for CVE-2025-53786 is under exploitation.
29,000 Exchange servers are vulnerable to CVE-2025-53786, which allows attackers to move within Microsoft cloud environments, potentially leading to complete domain compromise. CVE-2025-53786 allows a...
No Tariffs for 90 Days! China and the US Reach a Temporary Economic Agreement
The Government of the People’s Republic of China (“China”) and the Government of the United States of America (“USA”), according to a report by Beijing-based Xinhua ...
New 7-Zip flaw: Symbolic links turn extraction into a hack
A recently discovered security flaw in the popular file compression software 7-Zip has raised considerable concern within the security community. All versions of 7-Zip prior to 25.01 are affected by t...
James Cameron: AI can cause devastation like Skynet and Terminator
“The Skynet military defense system will go live on August 4, 1997. It will begin to self-educate, learning at an exponential rate, and will become self-aware at 2:14 a.m. on August 29. Panicki...
HTTP/1.1 Must Die! Critical vulnerabilities put millions of websites at risk.
A critical security flaw in HTTP/1.1 has been disclosed by security experts, highlighting a threat that has continued to impact web infrastructure for more than six years, potentially impacting millio...
A new Privilege Escalation (PE) technique allows UAC bypass on Windows
A recent discovery has uncovered a sophisticated technique that bypasses Windows User Account Control (UAC), allowing privilege escalation without user intervention through the use of the private font...
Discovering the Deep Web and Dark Web: The Ultimate Guide
There has been a lot of talk for some years now about the deep web and the dark web, and many have wondered: but what exactly does this mean? The dark web is often associated with shady and criminal a...
New Critical Vulnerability Discovered in Microsoft Exchange Server: CISA Warns
A critical security flaw has been discovered in hybrid deployments of Microsoft Exchange Server. This vulnerability (CWE-287) allows attackers with local administrative access to escalate their privil...
Critical Bugs on NVIDIA Triton Allow Attackers to Compromise and Steal AI Model
Critical vulnerabilities have been discovered in NVIDIA’s Triton Inference Server, threatening the security of AI infrastructure on Windows and Linux. The open-source solution is designed for l...
Malware disguises itself as an innocent photo on Dropbox. APT37’s steganographic strategy
Specialists at the Genians Security Center have discovered an improved version of the RoKRAT malware, associated with the North Korean APT37 group. The new version is distinguished by an unusual way o...
Featured Articles

29,000 Exchange servers are vulnerable to CVE-2025-53786, which allows attackers to move within Microsoft cloud environments, potentially leading to complete domain compromise. CVE-2025-53786 allows a...

The Government of the People’s Republic of China (“China”) and the Government of the United States of America (“USA”), according to a report by Beijing-based Xinhua ...

A recently discovered security flaw in the popular file compression software 7-Zip has raised considerable concern within the security community. All versions of 7-Zip prior to 25.01 are affected by t...

“The Skynet military defense system will go live on August 4, 1997. It will begin to self-educate, learning at an exponential rate, and will become self-aware at 2:14 a.m. on August 29. Panicki...

A critical security flaw in HTTP/1.1 has been disclosed by security experts, highlighting a threat that has continued to impact web infrastructure for more than six years, potentially impacting millio...

AI Panic: We’re Entering the Most Dangerous Phase of the Digital Revolution
In recent months, the debate over artificial intelligence has taken on increasingly extreme tones. On the one hand, large companies developing and selling AI solutions are pushing apocalyptic narratives, warning that those who don’t embrace this technology risk being excluded

Windows is losing ground. Linux is growing on corporate desktops, citing increased security.
Linux usage on corporate desktops and laptops continues to grow. An analysis of nearly 18.5 million devices found that Linux’s share of enterprise devices increased from 1.6% in January to 1.9% in June 2025. And among new assets introduced after

No Spyware for Every Crime! Germany Says No to Sentences Under Three Years
Germany’s Supreme Court rules that police can only use spyware to investigate serious crimes.It ruled that law enforcement cannot use spyware to monitor personal devices in cases carrying a maximum sentence of less than three years. The court responded to

Critical vulnerability in Google’s Gemini CLI allows malicious commands to be executed.
A serious vulnerability has been discovered in Google’s recently released Gemini CLI tool, which allows attackers to silently execute malicious commands and leak data from developers’ computers if certain commands are enabled on the system. The vulnerability was discovered by

Fortinet Discovers a New Obfuscated Web Shell. Analysis of UpdateChecker.aspx
The FortiGuard Labs team has published a detailed analysis of a heavily obfuscated web shell used to attack critical infrastructure in the Middle East. The research focuses on the UpdateChecker.aspx script running on the Microsoft IIS platform. It is implemented

You’ve been paying for months for a VPN that has done nothing but spy on you
The complex infrastructure of the fraudulent ad network VexTrio Viper has returned to the spotlight after researchers at Infoblox revealed details of a massive fake mobile app scheme. Under the guise of legitimate services—from VPNs to RAM cleaners, spam filters

150 Malicious Firefox Extensions Stole $1 Million in Cryptocurrency
Redazione RHC - August 10th, 2025
Koi Security analysts have discovered the GreedyBear malware campaign active in the Mozilla add-on store. 150 malicious Firefox extensions stole over $1 million worth of cryptocurrency from users. The fraudulent...

Over 60s, Under Fire! Hackers Stole $700 Million from Seniors
Redazione RHC - August 10th, 2025
Americans over 60 lost a staggering $700 million to online fraud in 2024, the highest figure ever recorded by the Federal Trade Commission (FTC). The new Consumer Protection Data Spotlight...

EDRs are still going offline! Threats are growing with EDRKillShifter’s offspring.
Redazione RHC - August 10th, 2025
A new tool for disabling EDR systems has emerged in the cybercriminal community, which Sophos experts believe to be an extension of the EDRKillShifter utility. Its use has already been...

GPT-5 Hacked in 24 Hours. Experts Find Surprising Weaknesses
Redazione RHC - August 9th, 2025
After Grok-4 was cracked in two days, GPT-5 was defeated in just 24 hours by the same researchers. Almost simultaneously, the SPLX (formerly SplxAI) testing team declared: "GPT-5 is crude...
Sign up for the newsletter