Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

29,000 Exchange servers at risk. The exploit for CVE-2025-53786 is under exploitation.
Di Redazione RHC - 13/08/2025

29,000 Exchange servers are vulnerable to CVE-2025-53786, which allows attackers to move within Microsoft cloud environments, potentially leading to complete domain compromise. CVE-2025-53786 allows a...

No Tariffs for 90 Days! China and the US Reach a Temporary Economic Agreement
Di Redazione RHC - 12/08/2025

The Government of the People’s Republic of China (“China”) and the Government of the United States of America (“USA”), according to a report by Beijing-based Xinhua ...

New 7-Zip flaw: Symbolic links turn extraction into a hack
Di Redazione RHC - 11/08/2025

A recently discovered security flaw in the popular file compression software 7-Zip has raised considerable concern within the security community. All versions of 7-Zip prior to 25.01 are affected by t...

James Cameron: AI can cause devastation like Skynet and Terminator
Di Redazione RHC - 10/08/2025

“The Skynet military defense system will go live on August 4, 1997. It will begin to self-educate, learning at an exponential rate, and will become self-aware at 2:14 a.m. on August 29. Panicki...

HTTP/1.1 Must Die! Critical vulnerabilities put millions of websites at risk.
Di Redazione RHC - 08/08/2025

A critical security flaw in HTTP/1.1 has been disclosed by security experts, highlighting a threat that has continued to impact web infrastructure for more than six years, potentially impacting millio...

What are ransomware gang data leak sites?

Ransomware gang data leak sites (DLSs) pose an increasingly widespread threat to businesses and individuals using the internet. These sites were created by cyber gangs to publish data stolen during a ransomware attack, when the data owner refuses to pay

Discovering the Deep Web and Dark Web: The Ultimate Guide

There has been a lot of talk for some years now about the deep web and the dark web, and many have wondered: but what exactly does this mean? The dark web is often associated with shady and criminal activities

Grok in “hot” mode! Create adult videos with Elon Musk’s AI

Elon Musk’s AI company, xAI, recently introduced a provocative feature to its Grok Imagine tool: “Spicy Mode.” This addition allows users to generate NSFW images and videos, marking a clear departure from the more restrictive content policies of other AI

EDRs are still going offline! Threats are growing with EDRKillShifter’s offspring.

- August 10th, 2025

A new tool for disabling EDR systems has emerged in the cybercriminal community, which Sophos experts believe to be an extension of the EDRKillShifter utility. Its use has already been...

  

GPT-5 Hacked in 24 Hours. Experts Find Surprising Weaknesses

- August 9th, 2025

After Grok-4 was cracked in two days, GPT-5 was defeated in just 24 hours by the same researchers. Almost simultaneously, the SPLX (formerly SplxAI) testing team declared: "GPT-5 is crude...

  

XVideos and Bang Bros under fire from Florida for age verification. Protection or censorship?

- August 9th, 2025

In recent weeks, we've discussed at length the storm that erupted in the United Kingdom after the law came into force requiring age verification for access to the main adult...

  

Did you double-click WinRAR? Congratulations! You’ve been compromised

- August 9th, 2025

A recently closed WinRAR vulnerability tracked under CVE-2025-8088 was exploited in targeted phishing attacks before the patch was released. The issue involved directory traversal and was only fixed in WinRAR...

  

Sign up for the newsletter