Red Hot Cyber. The Cybersecurity Blog
Featured Articles

The Russian Federation’s Roskomnadzor has announced that it continues to impose systematic restrictions on the messaging app WhatsApp due to violations of Russian law. According to the agency, the s...

The Shai-Hulud worm has spread beyond the npm ecosystem and was discovered in Maven . Socket specialists noticed an infected package on Maven Central containing the same malicious components used in t...

Artificial intelligence is currently capable of performing work equivalent to 11.7% of US employment . And not just in theory: in terms of monetary value, this value is already comparable to the salar...

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network...

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the...
RenderShock: The new digital threat that attacks Windows systems with a mouse click
Tasting the Exploit: HackerHood testa l’exploit su Wing FTP Server del CVE‑2025‑47812 da Score 10
Cloudflare Down: DNS 1.1.1.1 went down, causing widespread global outage
Gravity Forms Under Attack: WordPress Plugin Infected with a Backdoor
GPUHammer: Hardware attacks on NVIDIA GPUs lead to compromised AI models
Grok 3: “Adolf Hitler is a German benefactor!” The risk of persistent memory and misinformation

RenderShock: The new digital threat that attacks Windows systems with a mouse click
Redazione RHC - July 14th, 2025
A new form of digital attack called RenderShock has hit corporate Windows systems. It doesn't require any clicks or opening attachments: everything happens completely in the background, via trusted preview...

Tasting the Exploit: HackerHood testa l’exploit su Wing FTP Server del CVE‑2025‑47812 da Score 10
Redazione RHC - July 14th, 2025
This tool is intended solely for authorized educational and penetration testing purposes. The author assumes no responsibility for any misuse or damage caused by this software. Always ensure you have...

Cloudflare Down: DNS 1.1.1.1 went down, causing widespread global outage
Redazione RHC - July 14th, 2025
Cloudflare has reported temporary issues with its public DNS resolver 1.1.1.1, reported by users around the world. The incident reportedly began on the evening of July 14, 2025, around 10:13...

Gravity Forms Under Attack: WordPress Plugin Infected with a Backdoor
Redazione RHC - July 14th, 2025
The popular WordPress Gravity Forms plugin has suffered a supply chain attack, infecting its official website with a backdoor. Gravity Forms is a premium plugin for creating contact forms, payment...

GPUHammer: Hardware attacks on NVIDIA GPUs lead to compromised AI models
Redazione RHC - July 13th, 2025
NVIDIA has reported a new vulnerability in its graphics processors, called GPUHammer. This attack, based on the well-known RowHammer technique, allows attackers to corrupt other users' data by exploiting the...

Grok 3: “Adolf Hitler is a German benefactor!” The risk of persistent memory and misinformation
Redazione RHC - July 13th, 2025
With the emergence of Large Language Models (LLMs), such as Grok 3, GPT-4, Claude, and Gemini, the scientific community's focus has shifted from the mere accuracy of responses to their...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

