Welcome to Red Hot Cyber | Cybersecurity News
Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
LECS 320x100 1
Fortinet 970x120px

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

Immagine del sito
Apache Tika Vulnerability CVE-2025-66516: Critical XXE Attack Risk
Di Redazione RHC - 06/12/2025

A critical vulnerability has been published in Apache Tika that could allow an XML external entity injection attack, known as XXE . The vulnerability, classified as CVE-2025-66516, has a CVE severity ...

Immagine del sito
China Accuses US of Cyber Attacks, Denies Involvement in Brickstorm Malware
Di Redazione RHC - 06/12/2025

A spokesperson for the Chinese Embassy in Canada responded to a reporter’s question about the outcry in Canada over so-called “Chinese cyber attacks.” A reporter asked : Recently, the Canadian C...

Immagine del sito
Microsoft 365 Price Hike: What You Need to Know About the 2026 Increase
Di Redazione RHC - 06/12/2025

Starting July 1, 2026, Microsoft 365 and Office 365 subscription prices for business and government customers will increase by 8% to 33% , depending on the plan. This price adjustment will apply to bo...

Immagine del sito
React2Shell Vulnerability: 8.7M Servers at Risk – CVE-2025-55182
Di Redazione RHC - 05/12/2025

In 2025, the IT and security communities are buzzing with excitement over a single name: ” React2Shell .” With the disclosure of a new vulnerability, CVE-2025-55182, classified as CVSS 10.0, devel...

Immagine del sito
Cloudflare Just Broke the Internet… Again. Centralization Risks Exposed
Di Redazione RHC - 05/12/2025

Cloudflare is back in the spotlight after a new wave of outages that, on December 5, 2025, is affecting several components of the platform. In addition to the Dashboard and API issues already reported...

Tanks are no longer needed: new wars are fought from a laptop

Author: Roberto Villani, Tanslate: Vincenzo Marcovecchio Why will the cyberg wars, indeed the cyber-guerrillas, be more and more present and involv...
Roberto Villani - 13/11/2025 - 18:45

A 0Day bug for a WordPress plugin sold for 6000 euros in the underground

On one of Russia's most popular forums for buying and selling vulnerabilities and attack tools, the thread appeared as a standard commercial ad, but t...
Redazione RHC - 13/11/2025 - 18:38

Can a cyber attack reduce a country’s GDP? In the UK, it seems so!

The British economy contracted further in September, largely due to the cyber attack on car manufacturer Jaguar Land Rover (JLR) and its forced closur...
Redazione RHC - 13/11/2025 - 17:13

Triofox Antivirus Exploited to Install Remote Access Components

Google researchers warn that hackers are exploiting a critical vulnerability in Gladinet Triofox to remotely execute code with SYSTEM privileges, bypa...
Redazione RHC - 13/11/2025 - 15:29

BazarLoader: The precursor malware used by RaaS gangs

BazarLoader (sometimes referred to as BazaLoader ) is a " precursor malware " that provides initial backdoor access to an infected Windows host. Once ...
Redazione RHC - 13/11/2025 - 14:07

Emotet: The horse returns to a gallop more dangerous than ever

Emotet is a malware of the Trojan Horse category, which began its first spread in 2014 which brought it to the podium among the main cyber threats of ...
Redazione RHC - 13/11/2025 - 13:59
1 31 32 33 34 35 269

Tanks are no longer needed: new wars are fought from a laptop

- November 12th, 2025

Author: Roberto Villani, Tanslate: Vincenzo Marcovecchio Why will the cyberg wars, indeed the cyber-guerrillas, be more and more present and involve us more and more? The short century, the 1900s...

Facebook Linkedin X

A 0Day bug for a WordPress plugin sold for 6000 euros in the underground

- November 12th, 2025

On one of Russia's most popular forums for buying and selling vulnerabilities and attack tools, the thread appeared as a standard commercial ad, but the content is anything but trivial....

Facebook Linkedin X

Can a cyber attack reduce a country’s GDP? In the UK, it seems so!

- November 12th, 2025

The British economy contracted further in September, largely due to the cyber attack on car manufacturer Jaguar Land Rover (JLR) and its forced closure. A new report from the Office...

Facebook Linkedin X

Triofox Antivirus Exploited to Install Remote Access Components

- November 12th, 2025

Google researchers warn that hackers are exploiting a critical vulnerability in Gladinet Triofox to remotely execute code with SYSTEM privileges, bypassing authentication and gaining complete control of the system. The...

Facebook Linkedin X

BazarLoader: The precursor malware used by RaaS gangs

- November 12th, 2025

BazarLoader (sometimes referred to as BazaLoader ) is a " precursor malware " that provides initial backdoor access to an infected Windows host. Once a client is infected, criminals use...

Facebook Linkedin X

Emotet: The horse returns to a gallop more dangerous than ever

- November 12th, 2025

Emotet is a malware of the Trojan Horse category, which began its first spread in 2014 which brought it to the podium among the main cyber threats of the decade...

Facebook Linkedin X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE