Red Hot Cyber. The Cybersecurity Blog
The Robot Girlfriend is coming! The new frontier of Chinese-made technology.
While the rise of robots in China, the world’s largest market and producer of robots, is attracting the attention of the global information technology (IT) industry, the emergence of a “...
29,000 Exchange servers at risk. The exploit for CVE-2025-53786 is under exploitation.
29,000 Exchange servers are vulnerable to CVE-2025-53786, which allows attackers to move within Microsoft cloud environments, potentially leading to complete domain compromise. CVE-2025-53786 allows a...
No Tariffs for 90 Days! China and the US Reach a Temporary Economic Agreement
The Government of the People’s Republic of China (“China”) and the Government of the United States of America (“USA”), according to a report by Beijing-based Xinhua ...
New 7-Zip flaw: Symbolic links turn extraction into a hack
A recently discovered security flaw in the popular file compression software 7-Zip has raised considerable concern within the security community. All versions of 7-Zip prior to 25.01 are affected by t...
James Cameron: AI can cause devastation like Skynet and Terminator
“The Skynet military defense system will go live on August 4, 1997. It will begin to self-educate, learning at an exponential rate, and will become self-aware at 2:14 a.m. on August 29. Panicki...
HTTP/1.1 Must Die! Critical vulnerabilities put millions of websites at risk.
A critical security flaw in HTTP/1.1 has been disclosed by security experts, highlighting a threat that has continued to impact web infrastructure for more than six years, potentially impacting millio...
A new Privilege Escalation (PE) technique allows UAC bypass on Windows
A recent discovery has uncovered a sophisticated technique that bypasses Windows User Account Control (UAC), allowing privilege escalation without user intervention through the use of the private font...
Discovering the Deep Web and Dark Web: The Ultimate Guide
There has been a lot of talk for some years now about the deep web and the dark web, and many have wondered: but what exactly does this mean? The dark web is often associated with shady and criminal a...
New Critical Vulnerability Discovered in Microsoft Exchange Server: CISA Warns
A critical security flaw has been discovered in hybrid deployments of Microsoft Exchange Server. This vulnerability (CWE-287) allows attackers with local administrative access to escalate their privil...
Critical Bugs on NVIDIA Triton Allow Attackers to Compromise and Steal AI Model
Critical vulnerabilities have been discovered in NVIDIA’s Triton Inference Server, threatening the security of AI infrastructure on Windows and Linux. The open-source solution is designed for l...
Featured Articles

While the rise of robots in China, the world’s largest market and producer of robots, is attracting the attention of the global information technology (IT) industry, the emergence of a “...

29,000 Exchange servers are vulnerable to CVE-2025-53786, which allows attackers to move within Microsoft cloud environments, potentially leading to complete domain compromise. CVE-2025-53786 allows a...

The Government of the People’s Republic of China (“China”) and the Government of the United States of America (“USA”), according to a report by Beijing-based Xinhua ...

A recently discovered security flaw in the popular file compression software 7-Zip has raised considerable concern within the security community. All versions of 7-Zip prior to 25.01 are affected by t...

“The Skynet military defense system will go live on August 4, 1997. It will begin to self-educate, learning at an exponential rate, and will become self-aware at 2:14 a.m. on August 29. Panicki...

ElectroSim: The Ethical Hackers’ Virtual Environment for Studying OT/ICS Security Flaws
ElectroSim Industrialis an educational virtual machine that simulates the operating platform of a typical electric utility, combining consumption control, industrial monitoring, and essential cybersecurity concepts. The environment is designed for students, teachers, and professionals in training, offering a real-world laboratory

Windows 12 and 13: goodbye mouse and keyboard! Will user interaction be voice-only?
What will Windows 12 and even Windows 13 look like? David Weston, Microsoft vice president of enterprise and operating systems security, believes that in the future, Windows systems will most likely abandon the mouse and keyboard and use AI-powered dialogue

Drones under fire! A NATO country orders a 100 kW laser for air defense.
Australian company Electro Optic Systems Holdings Limited (EOS)has signed the world’s first export contract for a 100-kilowatt laser air defense system capable of destroying swarms of drones. The deal is valued at €71.4 million (approximately A$125 million), and the customer

James Cameron: AI can cause devastation like Skynet and Terminator
“The Skynet military defense system will go live on August 4, 1997. It will begin to self-educate, learning at an exponential rate, and will become self-aware at 2:14 a.m. on August 29. Panicking, authorities will order it to shut down.

150 Malicious Firefox Extensions Stole $1 Million in Cryptocurrency
Koi Security analysts have discovered the GreedyBear malware campaign active in the Mozilla add-on store. 150 malicious Firefox extensions stole over $1 million worth of cryptocurrency from users. The fraudulent add-ons were posing as extensions for popular cryptocurrency wallets from

Over 60s, Under Fire! Hackers Stole $700 Million from Seniors
Americans over 60 lost a staggering $700 million to online fraud in 2024, the highest figure ever recorded by the Federal Trade Commission (FTC). The new Consumer Protection Data Spotlight finds losses across all categories, from small to multimillion-dollar, increasing

As expected, the WinRAR bug has become a devastating weapon for cyber criminals
Redazione RHC - August 12th, 2025
As expected, the infamous WinRAR bug is now being actively exploited by attackers on a large scale, given the software's widespread use and popularity. ESET experts have reported that the...

No Tariffs for 90 Days! China and the US Reach a Temporary Economic Agreement
Redazione RHC - August 12th, 2025
The Government of the People's Republic of China ("China") and the Government of the United States of America ("USA"), according to a report by Beijing-based Xinhua news agency on August...

Toward Skynet: Johns Hopkins University Improves War Simulations with Artificial Intelligence
Redazione RHC - August 12th, 2025
Johns Hopkins University in Maryland is preparing to upgrade its AI-powered wargaming tools to help the Pentagon identify adversaries' weaknesses in real-world conflicts. The work, conducted at the university's Applied...

Microsoft Sued in California for Ending Windows 10 Support
Redazione RHC - August 12th, 2025
A lawsuit has been filed in California against Microsoft, accusing it of prematurely ending support for Windows 10 and forcing users to purchase new devices. The plaintiff, San Diego resident...
Sign up for the newsletter