Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The Russian Federation’s Roskomnadzor has announced that it continues to impose systematic restrictions on the messaging app WhatsApp due to violations of Russian law. According to the agency, the s...

The Shai-Hulud worm has spread beyond the npm ecosystem and was discovered in Maven . Socket specialists noticed an infected package on Maven Central containing the same malicious components used in t...

Artificial intelligence is currently capable of performing work equivalent to 11.7% of US employment . And not just in theory: in terms of monetary value, this value is already comparable to the salar...

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...
TIM and Poste Italiane launch the sovereign cloud: the birth of the Italian-made AI and innovation hub
An “autonomous” spy campaign was orchestrated by artificial intelligence
A 0-day exploit on FortiWeb WAF is actively exploited! And remove the Admin interfaces from the Internet
VLC and its creator receive award for choosing freedom over millions of dollars
What is Misevolution: The Autonomous Evolution of AI Agents, and It’s Not Always Good
Tanks are no longer needed: new wars are fought from a laptop

TIM and Poste Italiane launch the sovereign cloud: the birth of the Italian-made AI and innovation hub
Redazione RHC - November 13th, 2025
It was time for Italy to wait for a clear signal in the area of digital sovereignty. The union of two giants like TIM and Poste Italiane represents more than...

An “autonomous” spy campaign was orchestrated by artificial intelligence
Redazione RHC - November 13th, 2025
An analysis conducted in recent months had highlighted how the evolution of artificial intelligence systems was reaching a critical point for cybersecurity, with capabilities doubling in just six months ....

A 0-day exploit on FortiWeb WAF is actively exploited! And remove the Admin interfaces from the Internet
Redazione RHC - November 13th, 2025
Attackers are actively exploiting a critical flaw in Fortinet’s FortiWeb web application protection (WAF) system, which could be used as a means to conduct zero-day attacks without prior detection. As...

VLC and its creator receive award for choosing freedom over millions of dollars
Redazione RHC - November 12th, 2025
Whenever you come across an unknown media file or a strange link that won't open with any standard application, there's always one program that comes to the rescue: VLC ....

What is Misevolution: The Autonomous Evolution of AI Agents, and It’s Not Always Good
Redazione RHC - November 12th, 2025
Shanghai, November 11, 2025 – A new study conducted by the Shanghai Artificial Intelligence Laboratory , in collaboration with Shanghai Jiao Tong University , Renmin University of China , and...

Tanks are no longer needed: new wars are fought from a laptop
Roberto Villani - November 12th, 2025
Author: Roberto Villani, Tanslate: Vincenzo Marcovecchio Why will the cyberg wars, indeed the cyber-guerrillas, be more and more present and involve us more and more? The short century, the 1900s...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

