Red Hot Cyber. The Cybersecurity Blog
Featured Articles

Gartner analysts have urged businesses to temporarily stop using browsers with built-in artificial intelligence (AI) capabilities . In a recent advisory, the company emphasizes that such tools pose un...

A critical vulnerability affecting the FortiOS, FortiWeb, FortiProxy , and FortiSwitchManager product lines has been reported by Fortinet via an urgent security advisory. This advisory was issued in c...

It seems the White House isn’t entirely clear … at least judging by yet another change of heart regarding the sale of Nvidia’s advanced chips to China, with the Trump administration having decid...

According to a recently released report by the Financial Crimes Enforcement Network (FinCEN) , global ransomware activity peaked in 2023, only to plummet in 2024. This decline is attributed to success...

Despite significant geopolitical challenges, the mercenary spyware industry remains a resilient and persistent threat; in this context, the well-known vendor Intellexa continues to expand its arsenal....
A RCE vulnerability in Wing FTP Server rated 10 opens the door to 10,000 companies.
There’s no such thing as zero risk! There’s only one risk you need to know to manage.
Working in cybersecurity. Cybersecurity needs you.
What is cyber warfare? Between geopolitics, economics, and technology.
AI stymied by energy constraints, innovative space solutions needed
Donald Trump admits the US is hacking China: “That’s the way of the world.”

A RCE vulnerability in Wing FTP Server rated 10 opens the door to 10,000 companies.
Redazione RHC - July 11th, 2025
Huntress researchers have detected active exploitation of a critical vulnerability in Wing FTP Server, just one day after its public disclosure. The vulnerability CVE-2025-47812 has been assigned the highest severity...

There’s no such thing as zero risk! There’s only one risk you need to know to manage.
Redazione RHC - July 11th, 2025
Cybersecurity is a critically important topic for companies and organizations of all sizes and industries. As business operations and information management become increasingly digital, the risk of cyberattacks has become...

Working in cybersecurity. Cybersecurity needs you.
Redazione RHC - July 11th, 2025
We know it by now. Every country in the world (including Italy) has a huge shortage of cybersecurity experts, while cybercrime is rampant in every corner of the globe. This...

What is cyber warfare? Between geopolitics, economics, and technology.
Redazione RHC - July 11th, 2025
Cyber warfare is a form of conflict that takes place at the cyber and digital level. This form of warfare has become increasingly widespread in recent years, thanks to the...

AI stymied by energy constraints, innovative space solutions needed
Redazione RHC - July 11th, 2025
During an interview on the Manifold podcast, Omar Shams, head of the Google Agents project, emphasized that besides chips, the other major limitation to AI development is energy. It's often...

Donald Trump admits the US is hacking China: “That’s the way of the world.”
Redazione RHC - July 11th, 2025
President Donald Trump briefly left Maria Bartiromo speechless during an interview when he insinuated that the United States was hacking Chinese systems. The president highlighted the "large trade deficit with...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

