Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Latest news

Red Card 2.0: A major cybercrime bust! 651 scammers arrested in a major international operation. Cyber News

Red Card 2.0: A major cybercrime bust! 651 scammers arrested in a major international operation.

A major international operation against online scammers who have been defrauding individuals and businesses for years has concluded in Africa....
Redazione RHC - February 21, 2026
Google unveils Gemini 3.1 Pro: a major evolution of artificial intelligence Cyber News

Google unveils Gemini 3.1 Pro: a major evolution of artificial intelligence

In recent months, the pace at which artificial intelligence models are evolving has become almost dizzying. Each announcement seems to...
Redazione RHC - February 20, 2026
Fake 7-Zip Downloads Turn PCs Into Proxies: How to Spot and Stop It Cyber News

Fake 7-Zip Downloads Turn PCs Into Proxies: How to Spot and Stop It

It sounds almost unreal, yet it's happening: a download most people consider safe can quietly turn into a well-designed trap,...
Redazione RHC - February 9, 2026
Payment Networks Shut Down: What Caused the Card Chaos & How to Bounce Back Cyber News

Payment Networks Shut Down: What Caused the Card Chaos & How to Bounce Back

Some mornings feel like a throwback, right? You wake up scrolling and suddenly read that card machines across parts of...
Redazione RHC - February 9, 2026
Robots in search of flesh: When AI rents peripherals. Your body! innovation

Robots in search of flesh: When AI rents peripherals. Your body!

The evolution of Artificial Intelligence has crossed a new, disturbing frontier. If until yesterday we were talking about algorithms confined...
Silvia Felici - February 6, 2026
Google Unveils Gemini 3 Flash AI Model, Rivals OpenAI GPT-5.2 Cyber News

Google Unveils Gemini 3 Flash AI Model, Rivals OpenAI GPT-5.2

The battle for AI leadership is increasingly moving from the lab to mass production. The day after the release of...
Redazione RHC - December 18, 2025
Google Gemini 3.0 Shakes Nvidia’s AI Dominance with TPU Innovation Cyber News

Google Gemini 3.0 Shakes Nvidia’s AI Dominance with TPU Innovation

Nvidia's dominance in the artificial intelligence (AI) sector was shaken by the acclaim for Google's "Gemini 3.0." Nvidia's stock price...
Redazione RHC - November 25, 2025
Google launches Gemini 3, its most advanced artificial intelligence model Cyber News

Google launches Gemini 3, its most advanced artificial intelligence model

Google has announced the launch of Gemini 3, the next generation of its flagship artificial intelligence model, which the company...
Luca Vinciguerra - November 19, 2025
Google launches Gemini 3.0 Pro: new multimodal language model Cyber News

Google launches Gemini 3.0 Pro: new multimodal language model

Google has quietly launched Gemini 3.0 Pro , the latest development in its multimodal language model. The stated goal: to...
Redazione RHC - October 22, 2025
Google Announces Gemini 3.0: Artificial Intelligence Evolves Toward AGI Cyber News

Google Announces Gemini 3.0: Artificial Intelligence Evolves Toward AGI

At the Dreamforce conference in San Francisco, Google CEO Sundar Pichai announced that Google will release a new version of...
Luca Vinciguerra - October 20, 2025
GPUHammer: Hardware attacks on NVIDIA GPUs lead to compromised AI models Cyber News

GPUHammer: Hardware attacks on NVIDIA GPUs lead to compromised AI models

NVIDIA has reported a new vulnerability in its graphics processors, called GPUHammer. This attack, based on the well-known RowHammer technique,...
Redazione RHC - July 14, 2025
Grok 3: “Adolf Hitler is a German benefactor!” The risk of persistent memory and misinformation Cyber News

Grok 3: “Adolf Hitler is a German benefactor!” The risk of persistent memory and misinformation

With the emergence of Large Language Models (LLMs), such as Grok 3, GPT-4, Claude, and Gemini, the scientific community's focus...
Simone D'Agostino - July 14, 2025
   Next »

Claude Down! Major Anthropic AI Outage Hits All Users

Users of Claude, the well-known AI model developed by Anthropic, are currently experiencing significant issues. According to recent reports, the service appears to be undergoing a major outage that is...

Xi Jinping and the Chinese APT’s Ambition

The post-COVID macro political movements, including ongoing conflicts, have prompted a majority of states to shift their medium- to long-term political objectives. Clearly, a paradigm shift has been very common...

State-Sponsored “ILovePoop” Toolkit Targets Global Giants via React2Shell Vulnerability

The shelf life of a critical vulnerability is often measured in days, but React2Shell is proving to have a terrifyingly long tail. Months after its initial discovery, the flaw residing...

Red Card 2.0: A major cybercrime bust! 651 scammers arrested in a major international operation.

A major international operation against online scammers who have been defrauding individuals and businesses for years has concluded in Africa. Over the course of eight weeks, law enforcement arrested hundreds...

Google unveils Gemini 3.1 Pro: a major evolution of artificial intelligence

In recent months, the pace at which artificial intelligence models are evolving has become almost dizzying. Each announcement seems to redefine the next level of technological competition, and even those...

2149 BREAK THE SPHERE! The RHC & Hack The Box CTF at the RHC Conference 2026

In 2149, the world is no longer divided into nations, but into mega Autonomous City-States, hyper-technological urban giants competing for resources, data, and geopolitical power while the entire world is...

RHC Interviews Anubis Ransomware: Their View on RAMP, LockBit and the RaaS “Market”

Author: Luca Stivali, Raffaela Crisci, Lorenzo Nardi During the preliminary exchange leading up to the interview, Anubis expressed a very clear position regarding the collapse of several historical platforms within...

The Most Dangerous Sentence in IT: “Don’t Worry, They’re on Different VLANs”

In the world of IT, there is one expression that lowers defenses more effectively than any zero-day exploit: "Don't worry, they're on different VLANs." It is a reassuring phrase, usually...

Fake 7-Zip Downloads Turn PCs Into Proxies: How to Spot and Stop It

It sounds almost unreal, yet it's happening: a download most people consider safe can quietly turn into a well-designed trap, exposing a system and transforming it into a proxy node....

Payment Networks Shut Down: What Caused the Card Chaos & How to Bounce Back

Some mornings feel like a throwback, right? You wake up scrolling and suddenly read that card machines across parts of the US just… stopped working. Like the '90s all over...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE