Red Hot Cyber. The Cybersecurity Blog
Featured Articles

November 18, 2025 – After hours of widespread disruptions , the incident affecting Cloudflare’s global network finally appears to be nearing resolution. The company announced it has implemented a ...

Two serious vulnerabilities in IBM’s AIX operating system could allow remote attackers to execute arbitrary commands on affected systems, prompting the company to issue important security updates. B...

The room is the same: dim lights, chairs in a circle, thermoses of herbal teas now cold from all the talking and venting. We are Shakerati Anonimi , a group of people who never imagined we’d end up ...

Masimo, an American company that develops medical monitoring technologies, has won another round of litigation with Apple . A federal jury awarded it $634 million for infringing a patent on blood oxyg...

A massive DDoS attack was neutralized by Microsoft Azure on October 24. A single endpoint located in Australia was targeted by the attack, which reached a maximum speed of 15.72 terabits per second (T...
What is Misevolution: The Autonomous Evolution of AI Agents, and It’s Not Always Good
Tanks are no longer needed: new wars are fought from a laptop
A 0Day bug for a WordPress plugin sold for 6000 euros in the underground
Can a cyber attack reduce a country’s GDP? In the UK, it seems so!
Triofox Antivirus Exploited to Install Remote Access Components
BazarLoader: The precursor malware used by RaaS gangs

What is Misevolution: The Autonomous Evolution of AI Agents, and It’s Not Always Good
Redazione RHC - November 13th, 2025
Shanghai, November 11, 2025 – A new study conducted by the Shanghai Artificial Intelligence Laboratory , in collaboration with Shanghai Jiao Tong University , Renmin University of China , and...

Tanks are no longer needed: new wars are fought from a laptop
Roberto Villani - November 13th, 2025
Author: Roberto Villani, Tanslate: Vincenzo Marcovecchio Why will the cyberg wars, indeed the cyber-guerrillas, be more and more present and involve us more and more? The short century, the 1900s...

A 0Day bug for a WordPress plugin sold for 6000 euros in the underground
Redazione RHC - November 13th, 2025
On one of Russia's most popular forums for buying and selling vulnerabilities and attack tools, the thread appeared as a standard commercial ad, but the content is anything but trivial....

Can a cyber attack reduce a country’s GDP? In the UK, it seems so!
Redazione RHC - November 13th, 2025
The British economy contracted further in September, largely due to the cyber attack on car manufacturer Jaguar Land Rover (JLR) and its forced closure. A new report from the Office...

Triofox Antivirus Exploited to Install Remote Access Components
Redazione RHC - November 13th, 2025
Google researchers warn that hackers are exploiting a critical vulnerability in Gladinet Triofox to remotely execute code with SYSTEM privileges, bypassing authentication and gaining complete control of the system. The...

BazarLoader: The precursor malware used by RaaS gangs
Redazione RHC - November 13th, 2025
BazarLoader (sometimes referred to as BazaLoader ) is a " precursor malware " that provides initial backdoor access to an infected Windows host. Once a client is infected, criminals use...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

