Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

TM RedHotCyber 970x120 042543
Precedente Successivo

Latest news

The new version of the Konfety malware uses advanced evasion techniques Vulnerability

The new version of the Konfety malware uses advanced evasion techniques

A new version of the Android malware called Konfety has become even more sophisticated: specialists at Zimperium zLabs have discovered...
Agostino Pellegrino - July 17, 2025
The Inconvenient Truth About Work and AI: 99% Fight, 1% Win Cyber News

The Inconvenient Truth About Work and AI: 99% Fight, 1% Win

On July 11, local time, it was revealed that Google DeepMind had successfully "recruited" the core team of AI startup...
Redazione RHC - July 16, 2025
Discovering Scattered Spider: The Criminal Threat Using Advanced Tactics and Techniques Cyber News

Discovering Scattered Spider: The Criminal Threat Using Advanced Tactics and Techniques

By Cyber Defense Center Maticmind (Andrea Mariucci, Riccardo Michetti, Federico Savastano, Ada Spinelli) The Scattered Spider threat actor, UNC9344, made...
Sandro Sana - July 16, 2025
RenderShock: The new digital threat that attacks Windows systems with a mouse click Vulnerability

RenderShock: The new digital threat that attacks Windows systems with a mouse click

A new form of digital attack called RenderShock has hit corporate Windows systems. It doesn't require any clicks or opening...
Agostino Pellegrino - July 15, 2025
Tasting the Exploit: HackerHood testa l’exploit su Wing FTP Server del CVE‑2025‑47812 da Score 10 Vulnerability

Tasting the Exploit: HackerHood testa l’exploit su Wing FTP Server del CVE‑2025‑47812 da Score 10

This tool is intended solely for authorized educational and penetration testing purposes. The author assumes no responsibility for any misuse...
Agostino Pellegrino - July 15, 2025
GPUHammer: Hardware attacks on NVIDIA GPUs lead to compromised AI models Cyber News

GPUHammer: Hardware attacks on NVIDIA GPUs lead to compromised AI models

NVIDIA has reported a new vulnerability in its graphics processors, called GPUHammer. This attack, based on the well-known RowHammer technique,...
Redazione RHC - July 14, 2025

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE