Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Latest news

Google launches Gemini 3.0 Pro: new multimodal language model Cyber News

Google launches Gemini 3.0 Pro: new multimodal language model

Google has quietly launched Gemini 3.0 Pro , the latest development in its multimodal language model. The stated goal: to...
Redazione RHC - October 22, 2025
Google Announces Gemini 3.0: Artificial Intelligence Evolves Toward AGI Cyber News

Google Announces Gemini 3.0: Artificial Intelligence Evolves Toward AGI

At the Dreamforce conference in San Francisco, Google CEO Sundar Pichai announced that Google will release a new version of...
Luca Vinciguerra - October 20, 2025
GPUHammer: Hardware attacks on NVIDIA GPUs lead to compromised AI models Cyber News

GPUHammer: Hardware attacks on NVIDIA GPUs lead to compromised AI models

NVIDIA has reported a new vulnerability in its graphics processors, called GPUHammer. This attack, based on the well-known RowHammer technique,...
Redazione RHC - July 14, 2025
Grok 3: “Adolf Hitler is a German benefactor!” The risk of persistent memory and misinformation Cyber News

Grok 3: “Adolf Hitler is a German benefactor!” The risk of persistent memory and misinformation

With the emergence of Large Language Models (LLMs), such as Grok 3, GPT-4, Claude, and Gemini, the scientific community's focus...
Simone D'Agostino - July 14, 2025
Discovering LLM Firewalls: The New Frontier in Adaptive Cyber Security Cyber News

Discovering LLM Firewalls: The New Frontier in Adaptive Cyber Security

Over the past 3 years, generative AI, particularly large language models (LLMs), have revolutionized the way we interact with machines,...
Redazione RHC - July 14, 2025
Commodore 64: The return of the best-selling retro computer of all time is now Cybercrime

Commodore 64: The return of the best-selling retro computer of all time is now

The record for best-selling desktop computer of all time is still held by the Commodore 64, as certified by the...
Silvia Felici - July 13, 2025
Critical Vulnerability in FortiWeb: Score 9.6 and Unauthorized SQL Commands Cyber News

Critical Vulnerability in FortiWeb: Score 9.6 and Unauthorized SQL Commands

A new vulnerability, tracked under CVE-2025-25257, was recently published affecting several versions of Fortinet FortiWeb. This vulnerability could allow unauthenticated...
Massimiliano Brolli - July 13, 2025
A RCE vulnerability in Wing FTP Server rated 10 opens the door to 10,000 companies. Vulnerability

A RCE vulnerability in Wing FTP Server rated 10 opens the door to 10,000 companies.

Huntress researchers have detected active exploitation of a critical vulnerability in Wing FTP Server, just one day after its public...
Agostino Pellegrino - July 12, 2025
AI stymied by energy constraints, innovative space solutions needed Cyber News

AI stymied by energy constraints, innovative space solutions needed

During an interview on the Manifold podcast, Omar Shams, head of the Google Agents project, emphasized that besides chips, the...
Redazione RHC - July 12, 2025
TapTrap Attack: How to Get Yourself to Click Things Even Your Mom Wouldn’t Approve of Cyber News

TapTrap Attack: How to Get Yourself to Click Things Even Your Mom Wouldn’t Approve of

TapTrap exploits user interface animations to bypass Android's permissions system, allowing it to access sensitive data or trick the user...
Redazione RHC - July 11, 2025
AI will end the traditional software industry just as the Internet has changed traditional media. Cyber News

AI will end the traditional software industry just as the Internet has changed traditional media.

Generative AI, including tools like Cursor and ClaudeCode, are dramatically reducing the cost and time of software development. What once...
Redazione RHC - July 11, 2025
Critical Vulnerability in the Linux Kernel: A New Privilege Escalation Cyber News

Critical Vulnerability in the Linux Kernel: A New Privilege Escalation

A critical double-free vulnerability has been discovered in the pipapo set module of the NFT subsystem of the Linux kernel....
Massimiliano Brolli - July 11, 2025

Google launches Gemini 3, its most advanced artificial intelligence model

Google has announced the launch of Gemini 3, the next generation of its flagship artificial intelligence model, which the company is integrating into search, the Gemini app, cloud services, and...

Google is ready to launch Gemini 3.0: will it really be the turning point in the AI race?

Google is getting closer to the official unveiling of Gemini 3.0 , the new artificial intelligence model destined to represent one of the most significant steps in the company's strategy....

Gemini 3.0 Pro: What people who are trying it say

In recent days, a select few users have reported having access to the new Gemini 3.0 Pro model. Initial impressions suggest a significant improvement over the previous generation, so much...

Gemini 3.0 Pro: Google prepares for the generational leap and aims to surpass GPT-5 and Claude 4.5

Over the past few days, some users have received a notification saying that their Gemini Advanced devices have been "upgraded from the previous generation model to the 3.0 Pro, the...

Google launches Gemini 3.0 Pro: new multimodal language model

Google has quietly launched Gemini 3.0 Pro , the latest development in its multimodal language model. The stated goal: to improve contextual reasoning, the quality of results, and integration with...

Google Announces Gemini 3.0: Artificial Intelligence Evolves Toward AGI

At the Dreamforce conference in San Francisco, Google CEO Sundar Pichai announced that Google will release a new version of its artificial intelligence, Gemini 3.0 , later this year. The...

GPUHammer: Hardware attacks on NVIDIA GPUs lead to compromised AI models

NVIDIA has reported a new vulnerability in its graphics processors, called GPUHammer. This attack, based on the well-known RowHammer technique, allows attackers to corrupt other users' data by exploiting the...

Grok 3: “Adolf Hitler is a German benefactor!” The risk of persistent memory and misinformation

With the emergence of Large Language Models (LLMs), such as Grok 3, GPT-4, Claude, and Gemini, the scientific community's focus has shifted from the mere accuracy of responses to their...

Discovering LLM Firewalls: The New Frontier in Adaptive Cyber Security

Over the past 3 years, generative AI, particularly large language models (LLMs), have revolutionized the way we interact with machines, allowing us to obtain increasingly natural and contextualized responses. However,...

Commodore 64: The return of the best-selling retro computer of all time is now

The record for best-selling desktop computer of all time is still held by the Commodore 64, as certified by the Guinness Book of Records, despite its discontinuation in 1994. However,...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE