Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
2nd Edition GlitchZone RHC 320x100 2
Banner Ancharia Desktop 1 1

Category: Bug and vulnerability

Critical vulnerability in Blink: a website can block all Chromium-based browsers

Researcher José Pino has presented a proof-of-concept vulnerability in the Blink rendering engine used in Chromium -based browsers, demonstrating how a single web page can crash many popular browsers and render a device unusable in seconds. Pino published code for Brash , which demonstrated massive UI degradation and complete tab freezing on most tested Chromium builds. The vulnerability is related to an architectural feature of document.title processing: Blink has no rate limit for document title updates, allowing the script to make millions of changes to the DOM and overload the main thread in a matter of milliseconds. Pino’s method involves loading a

Malware alert: Critical WordPress plugin vulnerabilities actively exploited

Wordfence is raising the alarm about a large-scale malware campaign in which attackers are exploiting critical vulnerabilities in the popular WordPress plugins GutenKit and Hunk Companion . The company blocked 8.7 million such attack attempts against its customers in just two days. Hackers are exploiting three critical vulnerabilities (9.8 on the CVS19 security scale): CVE-2024-9234, CVE-2024-9707, and CVE-2024-11972. All of these vulnerabilities allow remote code execution on vulnerable websites. CVE-2024-9234 affects the GutenKit plugin, which has 40,000 active installations . The vulnerability is related to an unauthenticated REST endpoint and allows the installation of arbitrary plugins without authentication. The issue affects GutenKit

CoPhish is coming! Microsoft Copilot Studio used to steal accounts

Attackers are using an advanced phishing technique, known as CoPhish, that leverages Microsoft Copilot Studio to trick users into granting unauthorized access to their Microsoft Sign In ID accounts. A recent report details the attack and highlights how, despite Microsoft’s efforts to strengthen its consent policies, significant vulnerabilities remain in cloud-based AI tools. The growing adoption of tools like Copilot by organizations highlights the need for careful oversight of low-code platforms . In this space, user-configurable features designed to boost productivity can inadvertently facilitate phishing. This attack, discovered by researchers at Datadog Security Labs , uses customizable AI agents hosted on legitimate

Oracle Critical Patch Update October 2025: 374 vulnerabilities fixed

Oracle has released its new quarterly security update, the October 2025 Critical Patch Update , which addresses 374 vulnerabilities identified in numerous Oracle products. This is one of the largest patches in recent years, with fixes spanning databases, middleware, enterprise applications, and communications systems. As always, Oracle recommends that customers apply patches without delay, as many of the fixed vulnerabilities can be exploited remotely, even without authentication. This makes the update particularly urgent for all organizations using Oracle infrastructure in critical environments. An update that affects much of the Oracle ecosystem The October bulletin covers a long list of products, including: In

Visual Studio Code under attack: GlassWorm worm spreads via extensions

Researchers at Koi Security have detected a supply chain attack using OpenVSX and the Visual Studio Code Marketplace . Criminal hackers are distributing self-replicating malware called GlassWorm, which has already been installed approximately 35,800 times. Experts have discovered at least eleven GlassWorm -infected extensions in OpenVSX and one in the Visual Studio Code Marketplace: The malware hides its malicious code using invisible Unicode characters. Furthermore, GlassWorm has worm-like functionality and can spread independently: using the victim’s stolen credentials, it infects other extensions the victim has access to. The attackers use the Solana blockchain to control their botnet, using Google Calendar as a

EDR-Freeze Arrives! It Puts Windows into a Deep Coma Without Vulnerable Drivers

A Zero Salarium specialist has presented a method that temporarily disables antivirus processes and EDR agents on Windows using built-in system tools. The article details the concept and operational tool, EDR-Freeze , a way to specifically kill monitoring processes without installing additional vulnerable drivers , based on the behavior of native operating system components and race conditions between processes. The trick is that MiniDumpWriteDump forcibly suspends all threads of the target process while taking a snapshot, and the associated process that triggered the dump is responsible for resuming it. The research demonstrates how to force WerFaultSecure to run with protected process privileges

Sophos fixes five vulnerabilities in Sophos Firewall, two of which are rated critical

Sophos recently announced the fixes for five independent security vulnerabilities found in its firewalls, some critical and others high and medium. The vulnerabilities have been fixed via automatically distributed hotfixes, without requiring customers to take action, provided that the “Allow automatic installation of hotfixes” option is enabled, which is enabled by default in affected versions. Among the fixed vulnerabilities, two critical flaws stand out: the first (CVE-2025-6704) involves arbitrary file writing in the Secure PDF eXchange (SPX) feature, which could allow remote code execution before authentication in certain configurations in High Availability (HA) mode. The second (CVE-2025-7624) is a SQL injection in

What are security bugs? A journey through PoCs, exploits, bug bounty programs, and work.

A security bug, also known as a computer security bug, is a type of error or flaw in software that can be exploited by an attacker to compromise the security of a computer system. These bugs can be caused by a variety of factors, including programming errors, system design or configuration issues, security vulnerabilities in third-party libraries or other software used by the system, and so on. In some cases, security bugs can also be introduced during software maintenance, such as through the application of inadequately tested patches or security updates. Security bugs can be exploited by an attacker in a variety

What is a zero-day and the risk of targeted cyber attacks

Zero-day vulnerabilities are one of the greatest cybersecurity risks for organizations. These are unknown and unpatched vulnerabilities that attackers exploit to penetrate computer systems and compromise data security. In this article, we’ll explore zero-day vulnerabilities, how they’re discovered, how hackers use them, their market, and what the best practices are to prevent and mitigate these attacks. What is a zero-day vulnerability? A zero-day vulnerability is a computer security vulnerability in software, an operating system, or an application that is unknown to the software manufacturer, users, and security experts. This means that developers have not yet had time to identify and fix the

Linux Pwned! Privilege Escalation on SUDO in 5 seconds. HackerHood tests the CVE-2025-32463 exploit

Yesterday, Red Hot Cyber published an in-depth analysis of a gserious vulnerability discovered in SUDO (CVE-2025-32463), which allows escalation of privileges to root in Linux environments by exploiting an abuse of the chroot function. The exploit, made public by Stratascale, demonstrates how a non-privileged user can obtain root access through a precise chain of operations that exploit incorrect behavior in the management of child processes in environments chroot. Field testing: Manuel Roccon from the HackerHood group speaks Manuel Roccon, a researcher from the Red Hot Cyber HackerHood group, wanted to get his hands on the exploit to concretely verify its scope and