Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The Russian Federation’s Roskomnadzor has announced that it continues to impose systematic restrictions on the messaging app WhatsApp due to violations of Russian law. According to the agency, the s...

The Shai-Hulud worm has spread beyond the npm ecosystem and was discovered in Maven . Socket specialists noticed an infected package on Maven Central containing the same malicious components used in t...

Artificial intelligence is currently capable of performing work equivalent to 11.7% of US employment . And not just in theory: in terms of monetary value, this value is already comparable to the salar...

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...
A RCE vulnerability in Wing FTP Server rated 10 opens the door to 10,000 companies.
There’s no such thing as zero risk! There’s only one risk you need to know to manage.
Working in cybersecurity. Cybersecurity needs you.
What is cyber warfare? Between geopolitics, economics, and technology.
AI stymied by energy constraints, innovative space solutions needed
Donald Trump admits the US is hacking China: “That’s the way of the world.”

A RCE vulnerability in Wing FTP Server rated 10 opens the door to 10,000 companies.
Redazione RHC - July 11th, 2025
Huntress researchers have detected active exploitation of a critical vulnerability in Wing FTP Server, just one day after its public disclosure. The vulnerability CVE-2025-47812 has been assigned the highest severity...

There’s no such thing as zero risk! There’s only one risk you need to know to manage.
Redazione RHC - July 11th, 2025
Cybersecurity is a critically important topic for companies and organizations of all sizes and industries. As business operations and information management become increasingly digital, the risk of cyberattacks has become...

Working in cybersecurity. Cybersecurity needs you.
Redazione RHC - July 11th, 2025
We know it by now. Every country in the world (including Italy) has a huge shortage of cybersecurity experts, while cybercrime is rampant in every corner of the globe. This...

What is cyber warfare? Between geopolitics, economics, and technology.
Redazione RHC - July 11th, 2025
Cyber warfare is a form of conflict that takes place at the cyber and digital level. This form of warfare has become increasingly widespread in recent years, thanks to the...

AI stymied by energy constraints, innovative space solutions needed
Redazione RHC - July 11th, 2025
During an interview on the Manifold podcast, Omar Shams, head of the Google Agents project, emphasized that besides chips, the other major limitation to AI development is energy. It's often...

Donald Trump admits the US is hacking China: “That’s the way of the world.”
Redazione RHC - July 11th, 2025
President Donald Trump briefly left Maria Bartiromo speechless during an interview when he insinuated that the United States was hacking Chinese systems. The president highlighted the "large trade deficit with...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

