Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

HackTheBox 970x120 1
Precedente Successivo

Latest news

GPT-5 Hacked in 24 Hours. Experts Find Surprising Weaknesses Cyber News

GPT-5 Hacked in 24 Hours. Experts Find Surprising Weaknesses

After Grok-4 was cracked in two days, GPT-5 was defeated in just 24 hours by the same researchers. Almost simultaneously,...
Redazione RHC - August 9, 2025
A new Privilege Escalation (PE) technique allows UAC bypass on Windows Cyber News

A new Privilege Escalation (PE) technique allows UAC bypass on Windows

A recent discovery has uncovered a sophisticated technique that bypasses Windows User Account Control (UAC), allowing privilege escalation without user...
Massimiliano Brolli - August 8, 2025
AI Panic: We’re Entering the Most Dangerous Phase of the Digital Revolution Cyber News

AI Panic: We’re Entering the Most Dangerous Phase of the Digital Revolution

In recent months, the debate over artificial intelligence has taken on increasingly extreme tones. On the one hand, large companies...
Redazione RHC - August 8, 2025
No Spyware for Every Crime! Germany Says No to Sentences Under Three Years Cyber News

No Spyware for Every Crime! Germany Says No to Sentences Under Three Years

Germany's Supreme Court rules that police can only use spyware to investigate serious crimes.It ruled that law enforcement cannot use...
Stefano Gazzella - August 8, 2025
Discovering Access Brokers. What are Initial Access Brokers (IaBs) and what do they sell in the underground market? Cyber News

Discovering Access Brokers. What are Initial Access Brokers (IaBs) and what do they sell in the underground market?

We've often talked about how ransomware attacks work and how the ransomware as a service (RaaS) pyramid works, which assigns...
Marcello Filacchioni - August 7, 2025
What are ransomware gang data leak sites? Cybercrime

What are ransomware gang data leak sites?

Ransomware gang data leak sites (DLSs) pose an increasingly widespread threat to businesses and individuals using the internet. These sites...
Pietro Melillo - August 7, 2025

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE