Red Hot Cyber. The Cybersecurity Blog
Featured Articles

Despite significant geopolitical challenges, the mercenary spyware industry remains a resilient and persistent threat; in this context, the well-known vendor Intellexa continues to expand its arsenal....

Australia is soon to introduce groundbreaking legislation banning social media access for children under 16, an initiative that will set a precedent worldwide. A similar measure will soon be adopted i...

An increasingly aggressive campaign, directly targeting remote access infrastructure, has prompted threat actors to actively attempt to exploit vulnerabilities in Palo Alto Networks’ GlobalProtect V...

The U.S. Department of Justice has accused twin brothers Muneeb and Sohaib Akhter of deleting 96 databases containing sensitive information, including investigative records and documents requested und...

According to Eurostat, in 2023 only 55% of European Union citizens aged 16 to 74 had at least basic digital skills, with strong differences between countries: values ranging from around 83% in t...
Critical Vulnerability in FortiWeb: Fortinet and CISA Recommend Urgent Updates
China’s New Era of Robots: Shenzhen at the Center of the Technological Revolution
IndonesianFoods: The Worm That’s Wreaking Havoc on npm and Created 100,000 Packages
Vibe-Hacking: The New Frontier of Criminal Cybersecurity
Two-Factor Authentication and MFA: Protect Your Accounts in 3 Easy Steps!
John von Neumann: The Multifaceted Genius of 20th-Century Science

Critical Vulnerability in FortiWeb: Fortinet and CISA Recommend Urgent Updates
Redazione RHC - November 14th, 2025
Fortinet has confirmed the discovery of a critical relative path vulnerability (CWE-23) in FortiWeb devices, identified as CVE-2025-64446 and registered as IR Number FG-IR-25-910 . The flaw, published on November...

China’s New Era of Robots: Shenzhen at the Center of the Technological Revolution
Redazione RHC - November 14th, 2025
The 15th Chinese National Games opened with a spectacle that combined sport and technology. Among the highlights were robots capable of playing ancient bronze instruments, artificial intelligence systems capable of...

IndonesianFoods: The Worm That’s Wreaking Havoc on npm and Created 100,000 Packages
Redazione RHC - November 14th, 2025
A self-propagating worm, named IndonesianFoods , has been discovered in npm . It generates new packets every seven seconds. According to Sonatype, the malware has already created over 100,000 packets...

Vibe-Hacking: The New Frontier of Criminal Cybersecurity
Andrea Fellegara - November 14th, 2025
The cybersecurity landscape has accustomed us to constant upheavals. Every year new threats, new scenarios, and new criminal tactics emerge. But today, it's not just technology that's redefining the rules...

Two-Factor Authentication and MFA: Protect Your Accounts in 3 Easy Steps!
Redazione RHC - November 13th, 2025
Two-factor authentication (2FA) , or more commonly, Multi-Factor Authentication (MFA) , is an effective solution for protecting our online accounts. With the rise of cyberattacks and identity theft, it's crucial...

John von Neumann: The Multifaceted Genius of 20th-Century Science
Carlo Denza - November 13th, 2025
We meet the man considered one of the most multifaceted and brilliant scientists of the last century, perhaps equal only to Einstein. He possessed a wide range of scientific talents,...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

