Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Crowdstrike 320×100
Banner Ancharia Desktop 1 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Two Scattered Spider activists found guilty of TfL cyber attack Cybercrime

Two Scattered Spider activists found guilty of TfL cyber attack

Two young men involved in the Scattered Spider group have been charged as part of the National Crime Agency investigation...
Redazione RHC - 19 September 2025
NVIDIA’s demise in China! Tech companies ordered to stop purchasing GPUs. Cybercrime

NVIDIA’s demise in China! Tech companies ordered to stop purchasing GPUs.

Chinese authorities have ordered the country's largest tech companies, including Libaba, ByteDance, and Tencent, to stop purchasing Nvidia GPUs. The...
Redazione RHC - 19 September 2025
Frontier supercomputer surpasses Fugaku to become world’s fastest innovation

Frontier supercomputer surpasses Fugaku to become world’s fastest

The supercomputer "Fugaku," developed by Fujitsu in collaboration with the RIKEN Institute of Physical and Chemical Research, dominated the rankings...
Redazione RHC - 19 September 2025
Qilin Ransomware Strikes Deep into South Korean Finance Cybercrime

Qilin Ransomware Strikes Deep into South Korean Finance

Imagine waking up one morning and discovering that your sensitive financial data—contracts, customer lists, investment strategies—is exposed on a hidden...
Inva Malaj - 19 September 2025
Ready for AI-powered Notepad? Coming soon to Windows 11 with PC Copilot+! Cybercrime

Ready for AI-powered Notepad? Coming soon to Windows 11 with PC Copilot+!

Windows 11 users with PC Copilot+ will be able to take advantage of advanced artificial intelligence features, now an integral...
Redazione RHC - 19 September 2025
ShadowLeak Arrives: A 0-Click Bug in ChatGPT Leads to Sensitive Data Exfiltration Cybercrime

ShadowLeak Arrives: A 0-Click Bug in ChatGPT Leads to Sensitive Data Exfiltration

A new threat is beginning to emerge in the IT world: the world of artificial intelligence agents. ShadowLeak is a...
Redazione RHC - 19 September 2025

China calls for ethical and legal review of military humanoid robots

China has called for an urgent ethical and legal review of the military's use of humanoid robots, the South China Morning Post reports, citing the Chinese military's official newspaper, the...
Share on Facebook Share on LinkedIn Share on X

RenderShock: The new digital threat that attacks Windows systems with a mouse click

A new form of digital attack called RenderShock has hit corporate Windows systems. It doesn't require any clicks or opening attachments: everything happens completely in the background, via trusted preview...
Share on Facebook Share on LinkedIn Share on X

Tasting the Exploit: HackerHood testa l’exploit su Wing FTP Server del CVE‑2025‑47812 da Score 10

This tool is intended solely for authorized educational and penetration testing purposes. The author assumes no responsibility for any misuse or damage caused by this software. Always ensure you have...
Share on Facebook Share on LinkedIn Share on X

Cloudflare Down: DNS 1.1.1.1 went down, causing widespread global outage

Cloudflare has reported temporary issues with its public DNS resolver 1.1.1.1, reported by users around the world. The incident reportedly began on the evening of July 14, 2025, around 10:13...
Share on Facebook Share on LinkedIn Share on X

Gravity Forms Under Attack: WordPress Plugin Infected with a Backdoor

The popular WordPress Gravity Forms plugin has suffered a supply chain attack, infecting its official website with a backdoor. Gravity Forms is a premium plugin for creating contact forms, payment...
Share on Facebook Share on LinkedIn Share on X

GPUHammer: Hardware attacks on NVIDIA GPUs lead to compromised AI models

NVIDIA has reported a new vulnerability in its graphics processors, called GPUHammer. This attack, based on the well-known RowHammer technique, allows attackers to corrupt other users' data by exploiting the...
Share on Facebook Share on LinkedIn Share on X

Grok 3: “Adolf Hitler is a German benefactor!” The risk of persistent memory and misinformation

With the emergence of Large Language Models (LLMs), such as Grok 3, GPT-4, Claude, and Gemini, the scientific community's focus has shifted from the mere accuracy of responses to their...
Share on Facebook Share on LinkedIn Share on X

Discovering LLM Firewalls: The New Frontier in Adaptive Cyber Security

Over the past 3 years, generative AI, particularly large language models (LLMs), have revolutionized the way we interact with machines, allowing us to obtain increasingly natural and contextualized responses. However,...
Share on Facebook Share on LinkedIn Share on X

The biggest threat from AI? Young people won’t be able to think anymore!

"Now that the genie is out of the bottle, it's impossible to put it back!". How many times have we written these words about artificial intelligence? Now that the genie...
Share on Facebook Share on LinkedIn Share on X

What is phishing? Let’s avoid falling for the hack-fisherman’s bait.

With the increase in ransomware attacks—often launched via phishing emails—it's crucial to be proactive in protecting yourself and the organization you work for. Certainly, having computers and servers that are...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Webrat Malware Targets Security Researchers with GitHub Exploit Traps
Redazione RHC - 24/12/2025

There’s a specific moment, almost always at night, when curiosity overtakes caution. A newly opened repository, few stars but a success. very high score, the README file is well written enough to seem real. This…

Immagine del sitoCybercrime
A backdoor in NVIDIA code. Three 9.8 bugs plague AI and robotics development systems
Redazione RHC - 24/12/2025

When it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it for maintenance purposes or for…

Immagine del sitoCybercrime
La Poste Hit by Pro-Russian DDoS Attack During Peak Holiday Season
Redazione RHC - 23/12/2025

According to internal sources at RedHotCyber , the digital offensive that is causing problems for the National Postal System in France has been officially claimed by the pro-Russian hacker collective NoName057(16). Analysts confirm that the…

Immagine del sitoVulnerability
CVE-2025-47761: FortiClient VPN Zero-Day Exploit Lets Privilege Escalation
Manuel Roccon - 23/12/2025

The following analysis examines the attack vector for CVE-2025-47761 , a vulnerability found in the Fortips_74.sys kernel driver used by FortiClient VPN for Windows. The core of the vulnerability lies in a mishandled IOCTL that…

Immagine del sitoCybercrime
Critical MongoDB Vulnerability Exposed: CVE-2025-14847
Redazione RHC - 23/12/2025

A critical vulnerability has been identified in MongoDB, one of the most widely used NoSQL database platforms globally. This security flaw, tracked under CVE-2025-14847, allows attackers to extract sensitive data from server memory without requiring…