Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Banner Ransomfeed 970x120 1
Precedente Successivo

Latest news

Digital Decay: When the Promised Future Becomes a Cage Cybercrime

Digital Decay: When the Promised Future Becomes a Cage

For decades, we have celebrated digital as the promise of a more connected, efficient, and democratic future. But today, looking...
Massimiliano Brolli - August 6, 2025
With ToolShell, you can access the Internet information Services (IIS) Machine keys. Vulnerability

With ToolShell, you can access the Internet information Services (IIS) Machine keys.

In an article published on August 5, 2025, on the ISC SANS blog by Bojan Zdrnja, it is possible to...
Agostino Pellegrino - August 6, 2025
SonicWall in the crosshairs: possible 0-day vulnerability, users at risk Cyber News

SonicWall in the crosshairs: possible 0-day vulnerability, users at risk

Last Sunday, Red Hot Cyber published an in-depth analysis of the increased malicious activity of the AKIRA ransomware, which appears...
Sandro Sana - August 5, 2025
Critical Bugs on NVIDIA Triton Allow Attackers to Compromise and Steal AI Model Vulnerability

Critical Bugs on NVIDIA Triton Allow Attackers to Compromise and Steal AI Model

Critical vulnerabilities have been discovered in NVIDIA's Triton Inference Server, threatening the security of AI infrastructure on Windows and Linux....
Agostino Pellegrino - August 5, 2025
Everyone’s talking about GPT-5. No one’s seen it. But the memes are already everywhere. Cyber News

Everyone’s talking about GPT-5. No one’s seen it. But the memes are already everywhere.

GPT-5 hasn't even appeared yet, and internet users have started creating all kinds of memes to complain. Indeed, the rumors...
Redazione RHC - August 5, 2025
PoisonSeed: How Phishing Attacks Bypass FIDO with WebAuthn Cyber News

PoisonSeed: How Phishing Attacks Bypass FIDO with WebAuthn

The authors of the PoisonSeedphishing campaign have found a way to bypass FIDO (in this case, FIDO2 with WebAuthn) using...
Redazione RHC - August 5, 2025

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE