Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Crowdstrike 320×100
TM RedHotCyber 970x120 042543

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Apache Tika Vulnerability CVE-2025-66516: Critical XXE Attack Risk Cybercrime

Apache Tika Vulnerability CVE-2025-66516: Critical XXE Attack Risk

A critical vulnerability has been published in Apache Tika that could allow an XML external entity injection attack, known as...
Redazione RHC - 6 December 2025
China Accuses US of Cyber Attacks, Denies Involvement in Brickstorm Malware Cybercrime

China Accuses US of Cyber Attacks, Denies Involvement in Brickstorm Malware

A spokesperson for the Chinese Embassy in Canada responded to a reporter's question about the outcry in Canada over so-called...
Redazione RHC - 6 December 2025
AI Browser Attack: Google Drive Wiper Threat Exposed Cybercrime

AI Browser Attack: Google Drive Wiper Threat Exposed

Researchers at Striker STAR Labs have described a new agent-based browser attack that can turn a regular email into a...
Redazione RHC - 6 December 2025
NATO Cyber Coalition Exercise: Enhancing Cyber Defense with 1,300 Experts Cybercrime

NATO Cyber Coalition Exercise: Enhancing Cyber Defense with 1,300 Experts

NATO held its largest-ever cyber defense exercise, Cyber Coalition, in Estonia, involving approximately 1,300 specialists . The goal was to...
Redazione RHC - 6 December 2025
Microsoft 365 Price Hike: What You Need to Know About the 2026 Increase Cybercrime

Microsoft 365 Price Hike: What You Need to Know About the 2026 Increase

Starting July 1, 2026, Microsoft 365 and Office 365 subscription prices for business and government customers will increase by 8%...
Redazione RHC - 6 December 2025
React2Shell Vulnerability Exploited by China-Linked Hackers, Patch Now Cybercrime

React2Shell Vulnerability Exploited by China-Linked Hackers, Patch Now

We often discuss on this site that the window between the publication of an exploit and the launch of active...
Redazione RHC - 6 December 2025

Shakerati Anonimi: Nicoletta’s experience and the credit card thriller

The room is the same: dim lights, chairs in a circle, thermoses of herbal teas now cold from all the talking and venting. We are Shakerati Anonimi , a group...
Share on Facebook Share on LinkedIn Share on X

Apple ordered to pay $634 million to Masimo for patent infringement

Masimo, an American company that develops medical monitoring technologies, has won another round of litigation with Apple . A federal jury awarded it $634 million for infringing a patent on...
Share on Facebook Share on LinkedIn Share on X

Microsoft Azure blocks a 15.72 terabit per second DDoS attack

A massive DDoS attack was neutralized by Microsoft Azure on October 24. A single endpoint located in Australia was targeted by the attack, which reached a maximum speed of 15.72...
Share on Facebook Share on LinkedIn Share on X

Real World and Fictional World: A Psychological and Philosophical Analysis of the 1999 Film The Matrix by Lana and Lilly Wachowski

We've said too many times that nowadays, social networks have become an integral part of our daily lives: it's now natural to contact an acquaintance with a WhatsApp message, post...
Share on Facebook Share on LinkedIn Share on X

The phenomenon of polarization on the internet: Hikikomori

Many still maintain that hikikomori is an exclusively Japanese phenomenon. Yet, scientifically, numerous studies now confirm the existence of cases similar in characteristics to Japanese hikikomori in Spain, France, Italy,...
Share on Facebook Share on LinkedIn Share on X

From Likes to Depression: How Social Media Can Affect Our Mental Health

Questioning changes as they occur is always a difficult, if not downright foolhardy, undertaking. Certainly, when the object of the investigation concerns the changes social media has wrought on individuals,...
Share on Facebook Share on LinkedIn Share on X

The US and Global Surveillance: Uncovering Section 702 of the Foreign Intelligence Surveillance Act

Privacy in the United States is a constant topic of debate, especially in the digital age. The Supreme Court has played a central role in interpreting the Fourth Amendment, which...
Share on Facebook Share on LinkedIn Share on X

What is Cross-Site Scripting? An article to help you understand it in a simple way.

Author : Davide Cavallini Today I will try to use the same dialectic ( as previously done in the article on SQL injection ), and explain in a simple way...
Share on Facebook Share on LinkedIn Share on X

Spy Apps: How Spyware Works and Why It’s a Privacy Risk

Spyware (also known as spy apps) represent one of the most insidious and dangerous threats of the digital age. These are malicious programs designed to infiltrate a user's device, collecting...
Share on Facebook Share on LinkedIn Share on X

Asus releases emergency firmware update for vulnerable DSL routers.

Asus has released an emergency firmware update for several DSL router models. The patch addresses a critical vulnerability that allows attackers to take complete control of devices without authentication. The...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Undertow Vulnerability CVE-2025-12543 Exposes Java Ecosystem to Critical Security Risks
Redazione RHC - 09/01/2026

A flaw has been discovered in the foundation of the Java web ecosystem. Undertow , the high-performance web server that powers enterprise heavyweights like WildFly and JBoss EAP , has been hit by a critical…

Immagine del sitoCybercrime
Iran Protests Escalate as Reza Pahlavi Calls for Action Against Government
Redazione RHC - 09/01/2026

Iranian protesters chanted and marched through the streets until Friday morning, following a call from exiled former Prince Reza Pahlavi to demonstrate, despite the Iranian theocracy cutting off the country from the internet and international…

Immagine del sitoCybercrime
Veeam Backup Vulnerability: Critical RCE Flaw Discovered – Update Now
Redazione RHC - 08/01/2026

Backups are generally considered the last line of defense, but this week Veeam reminded us that backup systems themselves can become entry points for attacks. The company released security updates for Backup & Replication ,…

Immagine del sitoCybercrime
When Attack Discovery Becomes Automated, Detection Stops Scaling
Alexander Rogan - 08/01/2026

For much of the past two decades, cybersecurity has been built on a simple assumption: malicious activity can be detected, analysed, and responded to before meaningful damage occurs. This assumption shaped everything from SOC design…

Immagine del sitoCybercrime
CVE-2026-21858: n8n Vulnerability Exposes Thousands of Servers to RCE
Redazione RHC - 08/01/2026

The vulnerability, identified as CVE-2026-21858, which we recently reported on, affects approximately 100,000 servers worldwide, threatening to expose proprietary API keys, customer databases, and AI workflows. The vulnerability, with a CVSS score of 10, has…