Red Hot Cyber. The Cybersecurity Blog
Featured Articles

Apple is going through a period of major leadership changes , with the departure of key figures who have contributed significantly to the company’s technological development. The latest executive to...

Cloudflare experienced a significant outage on the morning of December 5, 2025, when at 8:47 a.m. UTC, a portion of its infrastructure began experiencing internal errors. The incident, which lasted ap...

A critical vulnerability has been published in Apache Tika that could allow an XML external entity injection attack, known as XXE . The vulnerability, classified as CVE-2025-66516, has a CVE severity ...

A spokesperson for the Chinese Embassy in Canada responded to a reporter’s question about the outcry in Canada over so-called “Chinese cyber attacks.” A reporter asked : Recently, the Canadian C...

Starting July 1, 2026, Microsoft 365 and Office 365 subscription prices for business and government customers will increase by 8% to 33% , depending on the plan. This price adjustment will apply to bo...
Two-Factor Authentication and MFA: Protect Your Accounts in 3 Easy Steps!
John von Neumann: The Multifaceted Genius of 20th-Century Science
The Wayback Machine “of souls” is coming soon. And so are the controversies
The AI market is in crisis: NVIDIA and other tech giants are declining.
A bug in ImunifyAV antivirus leads to RCE. 56 million sites at risk.
Discovering Remote Code Execution (RCE). The most feared security bug!

Two-Factor Authentication and MFA: Protect Your Accounts in 3 Easy Steps!
Redazione RHC - November 13th, 2025
Two-factor authentication (2FA) , or more commonly, Multi-Factor Authentication (MFA) , is an effective solution for protecting our online accounts. With the rise of cyberattacks and identity theft, it's crucial...

John von Neumann: The Multifaceted Genius of 20th-Century Science
Carlo Denza - November 13th, 2025
We meet the man considered one of the most multifaceted and brilliant scientists of the last century, perhaps equal only to Einstein. He possessed a wide range of scientific talents,...

The Wayback Machine “of souls” is coming soon. And so are the controversies
Redazione RHC - November 13th, 2025
Many of us grew up with Hiroshi Shiba, from Jeeg the steel robot who talked to his late father, Professor Senjiro Shiba, a scientist and archaeologist inside a large computer....

The AI market is in crisis: NVIDIA and other tech giants are declining.
Redazione RHC - November 13th, 2025
Artificial intelligence has been the biggest trend in recent years, as the stock prices of AI-related tech giants have skyrocketed. NVIDIA has surpassed the $5 trillion market cap, becoming a...

A bug in ImunifyAV antivirus leads to RCE. 56 million sites at risk.
Redazione RHC - November 13th, 2025
A vulnerability has been discovered in the Linux hosting ecosystem : the ImunifyAV malware scanner has been found to be vulnerable to remote code execution (RCE). The issue affects the...

Discovering Remote Code Execution (RCE). The most feared security bug!
Manuel Roccon - November 13th, 2025
Of all the vulnerabilities, the most feared by victims and the most sought after by attackers is remote code execution, or RCE. This vulnerability allows arbitrary commands to be executed...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

