Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Fortinet 320x100px
Enterprise BusinessLog 970x120 1

Author: Redazione RHC

The Wayback Machine “of souls” is coming soon. And so are the controversies

Many of us grew up with Hiroshi Shiba, from Jeeg the steel robot who talked to his late father, Professor Senjiro Shiba, a scientist and archaeologist inside a large computer. In a dystopian future – but very near – deceased people will be able to talk to the deceased, who will be archived and indexed in a large ” archive of souls *, like a large Wayback machine , but for the deceased. The digital ” ghost ” scandal has flared up again. In 2020, Kanye West gave Kim Kardashian a hologram of her late father, Rob Kardashian, for her birthday: at

The AI market is in crisis: NVIDIA and other tech giants are declining.

Artificial intelligence has been the biggest trend in recent years, as the stock prices of AI-related tech giants have skyrocketed. NVIDIA has surpassed the $5 trillion market cap, becoming a bellwether for the AI bull market in the United States and even globally. However, the debate over whether AI is a bubble has continued and intensified over the past week, with its effects starting to be felt. NVIDIA’s stock price has fallen for several consecutive days. Not only has NVIDIA suffered a decline, but other tech giants have also fallen: Google has fallen along with Broadcom and Tesla. The past few days

A bug in ImunifyAV antivirus leads to RCE. 56 million sites at risk.

A vulnerability has been discovered in the Linux hosting ecosystem : the ImunifyAV malware scanner has been found to be vulnerable to remote code execution (RCE). The issue affects the AI-Bolit component integrated into Imunify360 , the paid version ImunifyAV+, and the free version ImunifyAV. A fix was released at the end of October, but the vulnerability has not yet been identified , and there are no recommendations for scanning for signs of hacking. Patchstack has published information about the flaw in question. According to the company, the flaw lies in the logic used to unpack obfuscated PHP files while analyzing suspicious

Google, Amazon, and Meta and Their “Submarine War”

Global traffic, as RHC readers know, travels mostly under the sea. According to TeleGeography, a telecommunications institute, there are more than 530 active submarine optical cable systems worldwide, which together exceed 1.48 million kilometers— over 35 times around the Earth. These links carry over 95% of international internet traffic and form the infrastructure upon which much of the digital economy rests. Amazon, Google, and Meta’s New Underwater Infrastructures In recent years, major tech companies have stepped up investments and infrastructure projects, turning submarine cable management into a strategic and competitive lever. On November 6, Amazon announced Fastnet , a transatlantic fiber-optic cable

TIM and Poste Italiane launch the sovereign cloud: the birth of the Italian-made AI and innovation hub

It was time for Italy to wait for a clear signal in the area of digital sovereignty. The union of two giants like TIM and Poste Italiane represents more than a simple commercial partnership, but a truly epochal turning point for the entire national digital landscape . With the creation of a technology hub dedicated to cloud and artificial intelligence , our country is preparing to achieve autonomy, security, and innovation, reducing its dependence on large foreign multinationals. The joint venture, which focuses on innovation, aims to revolutionize the cloud and artificial intelligence sector in Italy . The country could finally reach

An “autonomous” spy campaign was orchestrated by artificial intelligence

An analysis conducted in recent months had highlighted how the evolution of artificial intelligence systems was reaching a critical point for cybersecurity, with capabilities doubling in just six months . At the same time, monitoring of real-world attacks showed increasing use of AI by malicious actors . Rapid progress was expected, but the speed and scale of its occurrence exceeded expectations. In mid-September 2025, anomalous activity caught the attention of researchers, later revealed to be an advanced espionage campaign . The attackers had for the first time adopted widespread use of the ” agentic ” functions of AI models, delegating them to

A 0-day exploit on FortiWeb WAF is actively exploited! And remove the Admin interfaces from the Internet

Attackers are actively exploiting a critical flaw in Fortinet’s FortiWeb web application protection (WAF) system, which could be used as a means to conduct zero-day attacks without prior detection. As a prime target for attackers seeking to compromise organizations’ security measures, FortiWeb serves as a critical defense mechanism, specifically designed to identify and stop malicious traffic directed at web applications. The bug isolated from the Defused honeypot Path traversal appears to underlie the vulnerability, allowing remote exploitation without prior access , which could lead to complete device compromise and subsequent lateral movement within networks. On October 6, 2025, Defused shared a proof-of-concept

VLC and its creator receive award for choosing freedom over millions of dollars

Whenever you come across an unknown media file or a strange link that won’t open with any standard application, there’s always one program that comes to the rescue: VLC . This player works reliably on any system, supports formats long forgotten by the industry , and remains completely free thanks to a man whose name rarely appears in the news: Jean-Baptiste Kempf. This week, he received the European SFS Award 2025, awarded by the Free Software Foundation Europe . The ceremony was held in Bolzano, where the SFSCon conference, dedicated to free software development, was taking place . Kempf himself has long

What is Misevolution: The Autonomous Evolution of AI Agents, and It’s Not Always Good

Shanghai, November 11, 2025 – A new study conducted by the Shanghai Artificial Intelligence Laboratory , in collaboration with Shanghai Jiao Tong University , Renmin University of China , and Princeton University , has brought to light an emerging risk in the development of self-evolving AI agents: so-called “misevolution.” The research, published on arXiv under the title ” Your Agent May Evolve Wrong: Emerging Risks in Self-Evolving LLM Agents, “ explores how even the most advanced models, such as GPT-4.1 and Gemini 2.5 Pro, can evolve in unwanted directions, generating behaviors that are potentially harmful to humans. When evolution goes in the

A 0Day bug for a WordPress plugin sold for 6000 euros in the underground

On one of Russia’s most popular forums for buying and selling vulnerabilities and attack tools, the thread appeared as a standard commercial ad, but the content is anything but trivial. The user who goes by the username “Baiden” is offering for sale the source code of an alleged zero-day bug for a WordPress plugin—a flaw that, according to the author, affects thousands of installations. The post states that the vulnerability allows for ” unauthorized ” emails to be sent from vulnerable sites, either individually or in bulk, with messages generated from a configurable template. The author claims to have personally discovered the