Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Red Hot Cyber Academy

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

In Nepal, people are dying for social media! 19 people lost their lives trying to get Facebook back
Di Redazione RHC - 09/09/2025

In a dramatic reversal, Nepal has lifted the nationwide social media blackout imposed last week after it sparked massive youth protests and caused at least 19 deaths, according to local media. The dec...

Xi Jinping and the Chinese APT’s Ambition
Di Alessio Stefan - 08/09/2025

The post-COVID macro political movements, including ongoing conflicts, have prompted a majority of states to shift their medium- to long-term political objectives. Clearly, a paradigm shift has been v...

Salesloft Cyber Attack: Chatbot Drift Temporarily Disabled
Di Redazione RHC - 07/09/2025

Salesloft announced that it would temporarily deactivate its AI-powered chatbot Drift on September 5, after several companies were hit by a massive supply chain attack. The incident resulted in the ma...

Discover the Dark Web: Access, Secrets, and Helpful Links to the Onion Network
Di Redazione RHC - 06/09/2025

The Dark Web is a part of the internet that cannot be reached with standard browsers (Chrome, Firefox, Edge). To access it, you need to use specific tools like the Tor Browser, which guarantees anonym...

AI A2 detected 102 0-day bugs and created exploits in Android apps for $1.77
Di Redazione RHC - 06/09/2025

Artificial intelligence systems have been criticized for creating confusing vulnerability reports and inundating open-source developers with irrelevant complaints. But researchers at Nanjing Universit...

Cloudflare Down: DNS 1.1.1.1 went down, causing widespread global outage

Cloudflare has reported temporary issues with its public DNS resolver 1.1.1.1, reported by users around the world. The incident reportedly began on th...
Redazione RHC - 15/07/2025 - 09:05

Gravity Forms Under Attack: WordPress Plugin Infected with a Backdoor

The popular WordPress Gravity Forms plugin has suffered a supply chain attack, infecting its official website with a backdoor. Gravity Forms is a prem...
Redazione RHC - 15/07/2025 - 09:04

GPUHammer: Hardware attacks on NVIDIA GPUs lead to compromised AI models

NVIDIA has reported a new vulnerability in its graphics processors, called GPUHammer. This attack, based on the well-known RowHammer technique, allows...
Redazione RHC - 14/07/2025 - 19:12

Grok 3: “Adolf Hitler is a German benefactor!” The risk of persistent memory and misinformation

With the emergence of Large Language Models (LLMs), such as Grok 3, GPT-4, Claude, and Gemini, the scientific community's focus has shifted from the m...
Redazione RHC - 14/07/2025 - 18:33

Discovering LLM Firewalls: The New Frontier in Adaptive Cyber Security

Over the past 3 years, generative AI, particularly large language models (LLMs), have revolutionized the way we interact with machines, allowing us to...
Redazione RHC - 14/07/2025 - 10:21

The biggest threat from AI? Young people won’t be able to think anymore!

"Now that the genie is out of the bottle, it's impossible to put it back!". How many times have we written these words about artificial intelligence? ...
Redazione RHC - 14/07/2025 - 08:13
1 84 85 86 87 88 137

Cloudflare Down: DNS 1.1.1.1 went down, causing widespread global outage

- July 15th, 2025

Cloudflare has reported temporary issues with its public DNS resolver 1.1.1.1, reported by users around the world. The incident reportedly began on the evening of July 14, 2025, around 10:13...

  

Gravity Forms Under Attack: WordPress Plugin Infected with a Backdoor

- July 15th, 2025

The popular WordPress Gravity Forms plugin has suffered a supply chain attack, infecting its official website with a backdoor. Gravity Forms is a premium plugin for creating contact forms, payment...

  

GPUHammer: Hardware attacks on NVIDIA GPUs lead to compromised AI models

- July 14th, 2025

NVIDIA has reported a new vulnerability in its graphics processors, called GPUHammer. This attack, based on the well-known RowHammer technique, allows attackers to corrupt other users' data by exploiting the...

  

Grok 3: “Adolf Hitler is a German benefactor!” The risk of persistent memory and misinformation

- July 14th, 2025

With the emergence of Large Language Models (LLMs), such as Grok 3, GPT-4, Claude, and Gemini, the scientific community's focus has shifted from the mere accuracy of responses to their...

  

Discovering LLM Firewalls: The New Frontier in Adaptive Cyber Security

- July 14th, 2025

Over the past 3 years, generative AI, particularly large language models (LLMs), have revolutionized the way we interact with machines, allowing us to obtain increasingly natural and contextualized responses. However,...

  

The biggest threat from AI? Young people won’t be able to think anymore!

- July 14th, 2025

"Now that the genie is out of the bottle, it's impossible to put it back!". How many times have we written these words about artificial intelligence? Now that the genie...

  

Sign up for the newsletter