Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

970x20 Itcentric
Precedente Successivo

Latest news

Discovering LLM Firewalls: The New Frontier in Adaptive Cyber Security Cyber News

Discovering LLM Firewalls: The New Frontier in Adaptive Cyber Security

Over the past 3 years, generative AI, particularly large language models (LLMs), have revolutionized the way we interact with machines,...
Redazione RHC - July 14, 2025
Commodore 64: The return of the best-selling retro computer of all time is now Cybercrime

Commodore 64: The return of the best-selling retro computer of all time is now

The record for best-selling desktop computer of all time is still held by the Commodore 64, as certified by the...
Silvia Felici - July 13, 2025
Critical Vulnerability in FortiWeb: Score 9.6 and Unauthorized SQL Commands Cyber News

Critical Vulnerability in FortiWeb: Score 9.6 and Unauthorized SQL Commands

A new vulnerability, tracked under CVE-2025-25257, was recently published affecting several versions of Fortinet FortiWeb. This vulnerability could allow unauthenticated...
Massimiliano Brolli - July 13, 2025
A RCE vulnerability in Wing FTP Server rated 10 opens the door to 10,000 companies. Vulnerability

A RCE vulnerability in Wing FTP Server rated 10 opens the door to 10,000 companies.

Huntress researchers have detected active exploitation of a critical vulnerability in Wing FTP Server, just one day after its public...
Agostino Pellegrino - July 12, 2025
AI stymied by energy constraints, innovative space solutions needed Cyber News

AI stymied by energy constraints, innovative space solutions needed

During an interview on the Manifold podcast, Omar Shams, head of the Google Agents project, emphasized that besides chips, the...
Redazione RHC - July 12, 2025
TapTrap Attack: How to Get Yourself to Click Things Even Your Mom Wouldn’t Approve of Cyber News

TapTrap Attack: How to Get Yourself to Click Things Even Your Mom Wouldn’t Approve of

TapTrap exploits user interface animations to bypass Android's permissions system, allowing it to access sensitive data or trick the user...
Redazione RHC - July 11, 2025

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE