Red Hot Cyber. The Cybersecurity Blog
Featured Articles

A critical vulnerability has been published in Apache Tika that could allow an XML external entity injection attack, known as XXE . The vulnerability, classified as CVE-2025-66516, has a CVE severity ...

A spokesperson for the Chinese Embassy in Canada responded to a reporter’s question about the outcry in Canada over so-called “Chinese cyber attacks.” A reporter asked : Recently, the Canadian C...

Starting July 1, 2026, Microsoft 365 and Office 365 subscription prices for business and government customers will increase by 8% to 33% , depending on the plan. This price adjustment will apply to bo...

In 2025, the IT and security communities are buzzing with excitement over a single name: ” React2Shell .” With the disclosure of a new vulnerability, CVE-2025-55182, classified as CVSS 10.0, devel...

Cloudflare is back in the spotlight after a new wave of outages that, on December 5, 2025, is affecting several components of the platform. In addition to the Dashboard and API issues already reported...
Be careful when using SSDs! Without power, you risk data loss
Quantum Computing vs. Artificial Intelligence: Which Will Really Change the Future?
ToddyCat APT Group Targets Microsoft 365 Email Security
Tor Boosts Security with Counter Galois Onion CGO Encryption
WormGPT 4: AI-Powered Cybercrime Tools on the Rise
EU lawmakers push for Microsoft alternative to boost tech sovereignty

Be careful when using SSDs! Without power, you risk data loss
Redazione RHC - November 26th, 2025
XDA Developers reminds us that using solid-state drives for long-term storage is risky. If SSDs are left without power for years, data can become corrupted or even disappear entirely. Unlike...

Quantum Computing vs. Artificial Intelligence: Which Will Really Change the Future?
Redazione RHC - November 26th, 2025
Quantum mechanics remains a complex and mysterious field, both difficult to explain and difficult to understand. This branch of physics studies the unusual behavior of tiny particles, phenomena that are...

ToddyCat APT Group Targets Microsoft 365 Email Security
Redazione RHC - November 26th, 2025
Email security continues to be one of the most critical points in modern cyber attacks. While compromising a Windows domain is already a success for a malicious actor, gaining access...

Tor Boosts Security with Counter Galois Onion CGO Encryption
Redazione RHC - November 26th, 2025
The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to...

WormGPT 4: AI-Powered Cybercrime Tools on the Rise
Redazione RHC - November 25th, 2025
Cybercriminals no longer need to convince ChatGPT or Claude Code to write malware or data-stealing scripts. A whole class of specialized language models, specifically designed for attacks, already exists. One...

EU lawmakers push for Microsoft alternative to boost tech sovereignty
Redazione RHC - November 25th, 2025
A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

