Red Hot Cyber. The Cybersecurity Blog
Featured Articles

Despite significant geopolitical challenges, the mercenary spyware industry remains a resilient and persistent threat; in this context, the well-known vendor Intellexa continues to expand its arsenal....

Australia is soon to introduce groundbreaking legislation banning social media access for children under 16, an initiative that will set a precedent worldwide. A similar measure will soon be adopted i...

An increasingly aggressive campaign, directly targeting remote access infrastructure, has prompted threat actors to actively attempt to exploit vulnerabilities in Palo Alto Networks’ GlobalProtect V...

The U.S. Department of Justice has accused twin brothers Muneeb and Sohaib Akhter of deleting 96 databases containing sensitive information, including investigative records and documents requested und...

According to Eurostat, in 2023 only 55% of European Union citizens aged 16 to 74 had at least basic digital skills, with strong differences between countries: values ranging from around 83% in t...
A bug in ImunifyAV antivirus leads to RCE. 56 million sites at risk.
Discovering Remote Code Execution (RCE). The most feared security bug!
Google, Amazon, and Meta and Their “Submarine War”
TIM and Poste Italiane launch the sovereign cloud: the birth of the Italian-made AI and innovation hub
An “autonomous” spy campaign was orchestrated by artificial intelligence
A 0-day exploit on FortiWeb WAF is actively exploited! And remove the Admin interfaces from the Internet

A bug in ImunifyAV antivirus leads to RCE. 56 million sites at risk.
Redazione RHC - November 13th, 2025
A vulnerability has been discovered in the Linux hosting ecosystem : the ImunifyAV malware scanner has been found to be vulnerable to remote code execution (RCE). The issue affects the...

Discovering Remote Code Execution (RCE). The most feared security bug!
Manuel Roccon - November 13th, 2025
Of all the vulnerabilities, the most feared by victims and the most sought after by attackers is remote code execution, or RCE. This vulnerability allows arbitrary commands to be executed...

Google, Amazon, and Meta and Their “Submarine War”
Redazione RHC - November 13th, 2025
Global traffic, as RHC readers know, travels mostly under the sea. According to TeleGeography, a telecommunications institute, there are more than 530 active submarine optical cable systems worldwide, which together...

TIM and Poste Italiane launch the sovereign cloud: the birth of the Italian-made AI and innovation hub
Redazione RHC - November 13th, 2025
It was time for Italy to wait for a clear signal in the area of digital sovereignty. The union of two giants like TIM and Poste Italiane represents more than...

An “autonomous” spy campaign was orchestrated by artificial intelligence
Redazione RHC - November 13th, 2025
An analysis conducted in recent months had highlighted how the evolution of artificial intelligence systems was reaching a critical point for cybersecurity, with capabilities doubling in just six months ....

A 0-day exploit on FortiWeb WAF is actively exploited! And remove the Admin interfaces from the Internet
Redazione RHC - November 13th, 2025
Attackers are actively exploiting a critical flaw in Fortinet’s FortiWeb web application protection (WAF) system, which could be used as a means to conduct zero-day attacks without prior detection. As...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

