Red Hot Cyber. The Cybersecurity Blog
Featured Articles

Apple is going through a period of major leadership changes , with the departure of key figures who have contributed significantly to the company’s technological development. The latest executive to...

Cloudflare experienced a significant outage on the morning of December 5, 2025, when at 8:47 a.m. UTC, a portion of its infrastructure began experiencing internal errors. The incident, which lasted ap...

A critical vulnerability has been published in Apache Tika that could allow an XML external entity injection attack, known as XXE . The vulnerability, classified as CVE-2025-66516, has a CVE severity ...

A spokesperson for the Chinese Embassy in Canada responded to a reporter’s question about the outcry in Canada over so-called “Chinese cyber attacks.” A reporter asked : Recently, the Canadian C...

Starting July 1, 2026, Microsoft 365 and Office 365 subscription prices for business and government customers will increase by 8% to 33% , depending on the plan. This price adjustment will apply to bo...
Critical Vulnerabilities Discovered in Hundreds of Brother and Other Printers
Pope warns: “AI is not the devil, but it can become one without ethics”
Microsoft 365 Under Attack: How Hackers Use Direct Send to Send Phishing Emails
Warning! WinRAR: Critical Vulnerability That Could Run Malware
He died because of ransomware! Another victim joins the list
A new fileless infostealer is being spread by Telegram and legitimate services

Critical Vulnerabilities Discovered in Hundreds of Brother and Other Printers
Redazione RHC - June 26th, 2025
Hundreds of printer models from Brother and other manufacturers (Fujifilm, Toshiba, Ricoh and Konica Minolta) have been found to be vulnerable to serious vulnerabilities discovered by researchers at Rapid7. For...

Pope warns: “AI is not the devil, but it can become one without ethics”
Redazione RHC - June 26th, 2025
The head of the Catholic Churchhas expressed concern about the way today's children and adolescents interact with digital technologies. In his viewthe abundance of information available through neural networks and...

Microsoft 365 Under Attack: How Hackers Use Direct Send to Send Phishing Emails
Redazione RHC - June 26th, 2025
A sophisticated phishing campaign that targeted over 70 organizations by exploiting Microsoft 365's Direct Send feature. The campaign, which began in May 2025 and has shown steady activity over the...

Warning! WinRAR: Critical Vulnerability That Could Run Malware
Redazione RHC - June 25th, 2025
WinRAR developers have fixed a Directory Traversal vulnerability, which has been assigned the identifier CVE-2025-6218. Under certain circumstances, this bug allowed malware to be executed after the archive was extracted....

He died because of ransomware! Another victim joins the list
Redazione RHC - June 25th, 2025
This is not the first time that a cyber attack has resulted in the loss of human lives.We had already discussed it in the article "I deferichò per il ransomware....

A new fileless infostealer is being spread by Telegram and legitimate services
Redazione RHC - June 25th, 2025
TLP: AMBERAnalyst: Agostino Pellegrino, Crescenzo Cuoppolo, Alessio BandiniLast revision date: 2025-06-24 This forensic technical report documents the complete analysis of a multi-stage infostealer delivered via a Python fileless loader, identified...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

