Red Hot Cyber. The Cybersecurity Blog
Featured Articles

Gartner analysts have urged businesses to temporarily stop using browsers with built-in artificial intelligence (AI) capabilities . In a recent advisory, the company emphasizes that such tools pose un...

A critical vulnerability affecting the FortiOS, FortiWeb, FortiProxy , and FortiSwitchManager product lines has been reported by Fortinet via an urgent security advisory. This advisory was issued in c...

It seems the White House isn’t entirely clear … at least judging by yet another change of heart regarding the sale of Nvidia’s advanced chips to China, with the Trump administration having decid...

According to a recently released report by the Financial Crimes Enforcement Network (FinCEN) , global ransomware activity peaked in 2023, only to plummet in 2024. This decline is attributed to success...

Despite significant geopolitical challenges, the mercenary spyware industry remains a resilient and persistent threat; in this context, the well-known vendor Intellexa continues to expand its arsenal....
AI-Generated Scams: New Threats with Deepfake Photos and Videos
Microsoft Windows LNK Vulnerability Exploited by Hackers
Apache Tika Vulnerability CVE-2025-66516: Critical XXE Attack Risk
China Accuses US of Cyber Attacks, Denies Involvement in Brickstorm Malware
AI Browser Attack: Google Drive Wiper Threat Exposed
NATO Cyber Coalition Exercise: Enhancing Cyber Defense with 1,300 Experts

AI-Generated Scams: New Threats with Deepfake Photos and Videos
Redazione RHC - December 6th, 2025
Criminals are increasingly using photos and videos from public sources to pass them off as evidence of an alleged kidnapping. The FBI warns that criminals are altering the images they...

Microsoft Windows LNK Vulnerability Exploited by Hackers
Redazione RHC - December 5th, 2025
Experts have discovered that in the summer of 2025, Microsoft patched a dangerous vulnerability in Windows that had been actively exploited by at least 11 hacker groups, including North Korean...

Apache Tika Vulnerability CVE-2025-66516: Critical XXE Attack Risk
Redazione RHC - December 5th, 2025
A critical vulnerability has been published in Apache Tika that could allow an XML external entity injection attack, known as XXE . The vulnerability, classified as CVE-2025-66516, has a CVE...

China Accuses US of Cyber Attacks, Denies Involvement in Brickstorm Malware
Redazione RHC - December 5th, 2025
A spokesperson for the Chinese Embassy in Canada responded to a reporter's question about the outcry in Canada over so-called "Chinese cyber attacks." A reporter asked : Recently, the Canadian...

AI Browser Attack: Google Drive Wiper Threat Exposed
Redazione RHC - December 5th, 2025
Researchers at Striker STAR Labs have described a new agent-based browser attack that can turn a regular email into a near-complete wiper of your Google Drive inbox. The attack targets...

NATO Cyber Coalition Exercise: Enhancing Cyber Defense with 1,300 Experts
Redazione RHC - December 5th, 2025
NATO held its largest-ever cyber defense exercise, Cyber Coalition, in Estonia, involving approximately 1,300 specialists . The goal was to practice protecting critical infrastructure from large-scale cyber attacks, simulating scenarios...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

