Red Hot Cyber. The Cybersecurity Blog
Featured Articles

A tool has been released that allows for the discreet monitoring of WhatsApp and Signal user activity using just a phone number. The tracking mechanism covers over three billion accounts and allows fo...

MITRE has released its ranking of the 25 most dangerous software vulnerabilities predicted for 2025, based on data collected through the National Vulnerability Database. These vulnerabilities were ide...

The prospect of a four-day workweek, with a resulting three-day long weekend, may not be far off. This is according to Christopher A. Pissarides , a British-Cypriot economist and Nobel Prize winner, w...

The recent 2025.4 release of Kali Linux has been made available to the public, introducing significant improvements to the GNOME, KDE, and Xfce desktop environments . From now on, Wayland will be the ...

An alleged database containing sensitive information on 18 million U.S. citizens over 65 has appeared for sale on a popular dark web forum. The advertiser, who uses the pseudonym “Frenshyny,” clai...
A bug in ImunifyAV antivirus leads to RCE. 56 million sites at risk.
Discovering Remote Code Execution (RCE). The most feared security bug!
Google, Amazon, and Meta and Their “Submarine War”
TIM and Poste Italiane launch the sovereign cloud: the birth of the Italian-made AI and innovation hub
An “autonomous” spy campaign was orchestrated by artificial intelligence
A 0-day exploit on FortiWeb WAF is actively exploited! And remove the Admin interfaces from the Internet

A bug in ImunifyAV antivirus leads to RCE. 56 million sites at risk.
Redazione RHC - November 13th, 2025
A vulnerability has been discovered in the Linux hosting ecosystem : the ImunifyAV malware scanner has been found to be vulnerable to remote code execution (RCE). The issue affects the...

Discovering Remote Code Execution (RCE). The most feared security bug!
Manuel Roccon - November 13th, 2025
Of all the vulnerabilities, the most feared by victims and the most sought after by attackers is remote code execution, or RCE. This vulnerability allows arbitrary commands to be executed...

Google, Amazon, and Meta and Their “Submarine War”
Redazione RHC - November 13th, 2025
Global traffic, as RHC readers know, travels mostly under the sea. According to TeleGeography, a telecommunications institute, there are more than 530 active submarine optical cable systems worldwide, which together...

TIM and Poste Italiane launch the sovereign cloud: the birth of the Italian-made AI and innovation hub
Redazione RHC - November 13th, 2025
It was time for Italy to wait for a clear signal in the area of digital sovereignty. The union of two giants like TIM and Poste Italiane represents more than...

An “autonomous” spy campaign was orchestrated by artificial intelligence
Redazione RHC - November 13th, 2025
An analysis conducted in recent months had highlighted how the evolution of artificial intelligence systems was reaching a critical point for cybersecurity, with capabilities doubling in just six months ....

A 0-day exploit on FortiWeb WAF is actively exploited! And remove the Admin interfaces from the Internet
Redazione RHC - November 13th, 2025
Attackers are actively exploiting a critical flaw in Fortinet’s FortiWeb web application protection (WAF) system, which could be used as a means to conduct zero-day attacks without prior detection. As...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

