Red Hot Cyber. The Cybersecurity Blog
Featured Articles

Anthropic has released Claude Opus 4.5 , its new flagship model, which the company says is the most powerful version yet and ranks at the top of the class for practical programming, agent-based produc...

On November 24, Alibaba announced Qwen3Max, which had been in public beta for a week , and had already surpassed 10 million downloads. It was a record that shattered all others. In a very short time, ...

Remote work has given employees freedom , but with it has also come digital surveillance . We discussed this some time ago in an article, reporting that these monitoring tools are also coming to Micro...

On November 13, Eurofiber France, a respected provider of fiber optic network and VPN solutions to many of France’s leading companies, discovered that its systems had been compromised by criminal ha...

This fall, we’ve had quite a bit of a cloud headache, I don’t know if you’ve noticed. That is, AWS, Azure , and then Cloudflare . All of them down, one after the other. A series of outages that ...
What are PsyOps? Exploring mind manipulation in the digital age.
Understanding Firewalls: The First Line of Defense in Cybersecurity
Critical Vulnerability in FortiWeb: Fortinet and CISA Recommend Urgent Updates
China’s New Era of Robots: Shenzhen at the Center of the Technological Revolution
IndonesianFoods: The Worm That’s Wreaking Havoc on npm and Created 100,000 Packages
Vibe-Hacking: The New Frontier of Criminal Cybersecurity

What are PsyOps? Exploring mind manipulation in the digital age.
Redazione RHC - November 15th, 2025
Psychological operations, commonly known as PsyOps, are a significant and often poorly understood element of military and security strategy . These operations involve the use of psychological tactics to influence...

Understanding Firewalls: The First Line of Defense in Cybersecurity
Redazione RHC - November 15th, 2025
In the world of cybersecurity, firewalls are the first line of defense against cyber threats and attacks. Every day, businesses and home users are exposed to risks such as malware,...

Critical Vulnerability in FortiWeb: Fortinet and CISA Recommend Urgent Updates
Redazione RHC - November 15th, 2025
Fortinet has confirmed the discovery of a critical relative path vulnerability (CWE-23) in FortiWeb devices, identified as CVE-2025-64446 and registered as IR Number FG-IR-25-910 . The flaw, published on November...

China’s New Era of Robots: Shenzhen at the Center of the Technological Revolution
Redazione RHC - November 15th, 2025
The 15th Chinese National Games opened with a spectacle that combined sport and technology. Among the highlights were robots capable of playing ancient bronze instruments, artificial intelligence systems capable of...

IndonesianFoods: The Worm That’s Wreaking Havoc on npm and Created 100,000 Packages
Redazione RHC - November 15th, 2025
A self-propagating worm, named IndonesianFoods , has been discovered in npm . It generates new packets every seven seconds. According to Sonatype, the malware has already created over 100,000 packets...

Vibe-Hacking: The New Frontier of Criminal Cybersecurity
Andrea Fellegara - November 15th, 2025
The cybersecurity landscape has accustomed us to constant upheavals. Every year new threats, new scenarios, and new criminal tactics emerge. But today, it's not just technology that's redefining the rules...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

