Red Hot Cyber. The Cybersecurity Blog
Featured Articles

A critical vulnerability has been published in Apache Tika that could allow an XML external entity injection attack, known as XXE . The vulnerability, classified as CVE-2025-66516, has a CVE severity ...

A spokesperson for the Chinese Embassy in Canada responded to a reporter’s question about the outcry in Canada over so-called “Chinese cyber attacks.” A reporter asked : Recently, the Canadian C...

Starting July 1, 2026, Microsoft 365 and Office 365 subscription prices for business and government customers will increase by 8% to 33% , depending on the plan. This price adjustment will apply to bo...

In 2025, the IT and security communities are buzzing with excitement over a single name: ” React2Shell .” With the disclosure of a new vulnerability, CVE-2025-55182, classified as CVSS 10.0, devel...

Cloudflare is back in the spotlight after a new wave of outages that, on December 5, 2025, is affecting several components of the platform. In addition to the Dashboard and API issues already reported...
Tanks are no longer needed: new wars are fought from a laptop
A 0Day bug for a WordPress plugin sold for 6000 euros in the underground
Can a cyber attack reduce a country’s GDP? In the UK, it seems so!
Triofox Antivirus Exploited to Install Remote Access Components
BazarLoader: The precursor malware used by RaaS gangs
Emotet: The horse returns to a gallop more dangerous than ever

Tanks are no longer needed: new wars are fought from a laptop
Roberto Villani - November 12th, 2025
Author: Roberto Villani, Tanslate: Vincenzo Marcovecchio Why will the cyberg wars, indeed the cyber-guerrillas, be more and more present and involve us more and more? The short century, the 1900s...

A 0Day bug for a WordPress plugin sold for 6000 euros in the underground
Redazione RHC - November 12th, 2025
On one of Russia's most popular forums for buying and selling vulnerabilities and attack tools, the thread appeared as a standard commercial ad, but the content is anything but trivial....

Can a cyber attack reduce a country’s GDP? In the UK, it seems so!
Redazione RHC - November 12th, 2025
The British economy contracted further in September, largely due to the cyber attack on car manufacturer Jaguar Land Rover (JLR) and its forced closure. A new report from the Office...

Triofox Antivirus Exploited to Install Remote Access Components
Redazione RHC - November 12th, 2025
Google researchers warn that hackers are exploiting a critical vulnerability in Gladinet Triofox to remotely execute code with SYSTEM privileges, bypassing authentication and gaining complete control of the system. The...

BazarLoader: The precursor malware used by RaaS gangs
Redazione RHC - November 12th, 2025
BazarLoader (sometimes referred to as BazaLoader ) is a " precursor malware " that provides initial backdoor access to an infected Windows host. Once a client is infected, criminals use...

Emotet: The horse returns to a gallop more dangerous than ever
Redazione RHC - November 12th, 2025
Emotet is a malware of the Trojan Horse category, which began its first spread in 2014 which brought it to the podium among the main cyber threats of the decade...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

