Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The prospect of a four-day workweek, with a resulting three-day long weekend, may not be far off. This is according to Christopher A. Pissarides , a British-Cypriot economist and Nobel Prize winner, w...

The recent 2025.4 release of Kali Linux has been made available to the public, introducing significant improvements to the GNOME, KDE, and Xfce desktop environments . From now on, Wayland will be the ...

An alleged database containing sensitive information on 18 million U.S. citizens over 65 has appeared for sale on a popular dark web forum. The advertiser, who uses the pseudonym “Frenshyny,” clai...

A recent study by Datadog Security Labs reveals an ongoing operation targeting organizations using Microsoft 365 and Okta for single sign-on (SSO) authentication. This operation uses sophisticated tec...

The React Server component security saga continues this week. Following the patching of a critical remote code execution (RCE) vulnerability that led to React2shell, researchers have discovered two ne...
Pat Gelsinger on Quantum Computing Impact on AI Future
AI-Generated Scams: New Threats with Deepfake Photos and Videos
Microsoft Windows LNK Vulnerability Exploited by Hackers
Apache Tika Vulnerability CVE-2025-66516: Critical XXE Attack Risk
China Accuses US of Cyber Attacks, Denies Involvement in Brickstorm Malware
AI Browser Attack: Google Drive Wiper Threat Exposed

Pat Gelsinger on Quantum Computing Impact on AI Future
Redazione RHC - December 6th, 2025
Former Intel CEO Pat Gelsinger has shared a series of assessments on the future of computing, and in particular, the evolution of artificial intelligence. In an interview with the Financial...

AI-Generated Scams: New Threats with Deepfake Photos and Videos
Redazione RHC - December 6th, 2025
Criminals are increasingly using photos and videos from public sources to pass them off as evidence of an alleged kidnapping. The FBI warns that criminals are altering the images they...

Microsoft Windows LNK Vulnerability Exploited by Hackers
Redazione RHC - December 5th, 2025
Experts have discovered that in the summer of 2025, Microsoft patched a dangerous vulnerability in Windows that had been actively exploited by at least 11 hacker groups, including North Korean...

Apache Tika Vulnerability CVE-2025-66516: Critical XXE Attack Risk
Redazione RHC - December 5th, 2025
A critical vulnerability has been published in Apache Tika that could allow an XML external entity injection attack, known as XXE . The vulnerability, classified as CVE-2025-66516, has a CVE...

China Accuses US of Cyber Attacks, Denies Involvement in Brickstorm Malware
Redazione RHC - December 5th, 2025
A spokesperson for the Chinese Embassy in Canada responded to a reporter's question about the outcry in Canada over so-called "Chinese cyber attacks." A reporter asked : Recently, the Canadian...

AI Browser Attack: Google Drive Wiper Threat Exposed
Redazione RHC - December 5th, 2025
Researchers at Striker STAR Labs have described a new agent-based browser attack that can turn a regular email into a near-complete wiper of your Google Drive inbox. The attack targets...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

