Red Hot Cyber. The Cybersecurity Blog
Featured Articles

Shannon acts as a penetration tester who doesn’t just report vulnerabilities, but launches actual exploits. Shannon’s goal is to breach your web application’s security before anyone with malicio...

The scene is always the same: monitors lit, dashboards full of alerts, logs scrolling too quickly, an anxious customer on the other end of the call. You sit down, look around, and realize that, once a...

A well-known initial access broker (IAB) called ” Storm-0249 ” has changed its operational strategies, using phishing campaigns as well as highly targeted attacks, which exploit the very security ...

A tool has been released that allows for the discreet monitoring of WhatsApp and Signal user activity using just a phone number. The tracking mechanism covers over three billion accounts and allows fo...

MITRE has released its ranking of the 25 most dangerous software vulnerabilities predicted for 2025, based on data collected through the National Vulnerability Database. These vulnerabilities were ide...
An “autonomous” spy campaign was orchestrated by artificial intelligence
A 0-day exploit on FortiWeb WAF is actively exploited! And remove the Admin interfaces from the Internet
VLC and its creator receive award for choosing freedom over millions of dollars
What is Misevolution: The Autonomous Evolution of AI Agents, and It’s Not Always Good
Tanks are no longer needed: new wars are fought from a laptop
A 0Day bug for a WordPress plugin sold for 6000 euros in the underground

An “autonomous” spy campaign was orchestrated by artificial intelligence
Redazione RHC - November 13th, 2025
An analysis conducted in recent months had highlighted how the evolution of artificial intelligence systems was reaching a critical point for cybersecurity, with capabilities doubling in just six months ....

A 0-day exploit on FortiWeb WAF is actively exploited! And remove the Admin interfaces from the Internet
Redazione RHC - November 13th, 2025
Attackers are actively exploiting a critical flaw in Fortinet’s FortiWeb web application protection (WAF) system, which could be used as a means to conduct zero-day attacks without prior detection. As...

VLC and its creator receive award for choosing freedom over millions of dollars
Redazione RHC - November 12th, 2025
Whenever you come across an unknown media file or a strange link that won't open with any standard application, there's always one program that comes to the rescue: VLC ....

What is Misevolution: The Autonomous Evolution of AI Agents, and It’s Not Always Good
Redazione RHC - November 12th, 2025
Shanghai, November 11, 2025 – A new study conducted by the Shanghai Artificial Intelligence Laboratory , in collaboration with Shanghai Jiao Tong University , Renmin University of China , and...

Tanks are no longer needed: new wars are fought from a laptop
Roberto Villani - November 12th, 2025
Author: Roberto Villani, Tanslate: Vincenzo Marcovecchio Why will the cyberg wars, indeed the cyber-guerrillas, be more and more present and involve us more and more? The short century, the 1900s...

A 0Day bug for a WordPress plugin sold for 6000 euros in the underground
Redazione RHC - November 12th, 2025
On one of Russia's most popular forums for buying and selling vulnerabilities and attack tools, the thread appeared as a standard commercial ad, but the content is anything but trivial....
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

