Red Hot Cyber. The Cybersecurity Blog
Featured Articles

MITRE has released its ranking of the 25 most dangerous software vulnerabilities predicted for 2025, based on data collected through the National Vulnerability Database. These vulnerabilities were ide...

The prospect of a four-day workweek, with a resulting three-day long weekend, may not be far off. This is according to Christopher A. Pissarides , a British-Cypriot economist and Nobel Prize winner, w...

The recent 2025.4 release of Kali Linux has been made available to the public, introducing significant improvements to the GNOME, KDE, and Xfce desktop environments . From now on, Wayland will be the ...

An alleged database containing sensitive information on 18 million U.S. citizens over 65 has appeared for sale on a popular dark web forum. The advertiser, who uses the pseudonym “Frenshyny,” clai...

A recent study by Datadog Security Labs reveals an ongoing operation targeting organizations using Microsoft 365 and Okta for single sign-on (SSO) authentication. This operation uses sophisticated tec...
Cloudflare Outage: 25 Minutes of Chaos Due to React Server Issue
Microsoft CEO on AI Challenges
Pat Gelsinger on Quantum Computing Impact on AI Future
AI-Generated Scams: New Threats with Deepfake Photos and Videos
Microsoft Windows LNK Vulnerability Exploited by Hackers
Apache Tika Vulnerability CVE-2025-66516: Critical XXE Attack Risk

Cloudflare Outage: 25 Minutes of Chaos Due to React Server Issue
Redazione RHC - December 6th, 2025
Cloudflare experienced a significant outage on the morning of December 5, 2025, when at 8:47 a.m. UTC, a portion of its infrastructure began experiencing internal errors. The incident, which lasted...

Microsoft CEO on AI Challenges
Redazione RHC - December 6th, 2025
In a conversation with Matthias Döpfner, CEO of Axel Springer, Microsoft CEO Satya Nadella acknowledged that the Redmond-based company's impressive growth is currently a limiting factor in the competition in...

Pat Gelsinger on Quantum Computing Impact on AI Future
Redazione RHC - December 6th, 2025
Former Intel CEO Pat Gelsinger has shared a series of assessments on the future of computing, and in particular, the evolution of artificial intelligence. In an interview with the Financial...

AI-Generated Scams: New Threats with Deepfake Photos and Videos
Redazione RHC - December 6th, 2025
Criminals are increasingly using photos and videos from public sources to pass them off as evidence of an alleged kidnapping. The FBI warns that criminals are altering the images they...

Microsoft Windows LNK Vulnerability Exploited by Hackers
Redazione RHC - December 5th, 2025
Experts have discovered that in the summer of 2025, Microsoft patched a dangerous vulnerability in Windows that had been actively exploited by at least 11 hacker groups, including North Korean...

Apache Tika Vulnerability CVE-2025-66516: Critical XXE Attack Risk
Redazione RHC - December 5th, 2025
A critical vulnerability has been published in Apache Tika that could allow an XML external entity injection attack, known as XXE . The vulnerability, classified as CVE-2025-66516, has a CVE...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

