Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Banner Ransomfeed 970x120 1
Precedente Successivo

Latest news

The AI we love! From years to just months to discover a molecule for Crohn’s disease Cyber News

The AI we love! From years to just months to discover a molecule for Crohn’s disease

Antibiotics for inflammatory bowel disease can be a double-edged sword. While they suppress inflammation, they also kill beneficial bacteria, not...
Redazione RHC - October 4, 2025
Discord Confirms Hack Attack: Sensitive Information at Risk Cyber News

Discord Confirms Hack Attack: Sensitive Information at Risk

A third-party customer service provider was compromised by hackers, who gained access to partial payment information and personally identifiable information...
Redazione RHC - October 4, 2025
SoopSocks: The PyPI Package That Looked Like a Proxy But Was a Backdoor to Windows Cybercrime

SoopSocks: The PyPI Package That Looked Like a Proxy But Was a Backdoor to Windows

The story of SoopSocks is one we, unfortunately, know well: a PyPI package that promises utility — a SOCKS5 proxy...
Antonio Piazzolla - October 4, 2025
Can a backdoor be implemented for only one country? Apple resists UK demands. Cyber News

Can a backdoor be implemented for only one country? Apple resists UK demands.

The United Kingdom has again attempted to force Apple to access encrypted backups of user data stored on iCloud ....
Redazione RHC - October 4, 2025
KaruHunters Claims Cyber Attack on RIPE NCC Cyber News

KaruHunters Claims Cyber Attack on RIPE NCC

A post recently appeared on a popular underground forum that's attracting the attention of the cybersecurity community. A user with...
Redazione RHC - October 4, 2025
Computer science is no longer a safe career! What’s changing for students and companies? Cyber News

Computer science is no longer a safe career! What’s changing for students and companies?

For decades, computer science was considered a stable career choice, brimming with opportunities. Today, however, students, universities, and businesses face...
Redazione RHC - October 4, 2025

RenderShock: The new digital threat that attacks Windows systems with a mouse click

A new form of digital attack called RenderShock has hit corporate Windows systems. It doesn't require any clicks or opening attachments: everything happens completely in the background, via trusted preview...

Tasting the Exploit: HackerHood testa l’exploit su Wing FTP Server del CVE‑2025‑47812 da Score 10

This tool is intended solely for authorized educational and penetration testing purposes. The author assumes no responsibility for any misuse or damage caused by this software. Always ensure you have...

GPUHammer: Hardware attacks on NVIDIA GPUs lead to compromised AI models

NVIDIA has reported a new vulnerability in its graphics processors, called GPUHammer. This attack, based on the well-known RowHammer technique, allows attackers to corrupt other users' data by exploiting the...

Grok 3: “Adolf Hitler is a German benefactor!” The risk of persistent memory and misinformation

With the emergence of Large Language Models (LLMs), such as Grok 3, GPT-4, Claude, and Gemini, the scientific community's focus has shifted from the mere accuracy of responses to their...

Discovering LLM Firewalls: The New Frontier in Adaptive Cyber Security

Over the past 3 years, generative AI, particularly large language models (LLMs), have revolutionized the way we interact with machines, allowing us to obtain increasingly natural and contextualized responses. However,...

Commodore 64: The return of the best-selling retro computer of all time is now

The record for best-selling desktop computer of all time is still held by the Commodore 64, as certified by the Guinness Book of Records, despite its discontinuation in 1994. However,...

Critical Vulnerability in FortiWeb: Score 9.6 and Unauthorized SQL Commands

A new vulnerability, tracked under CVE-2025-25257, was recently published affecting several versions of Fortinet FortiWeb. This vulnerability could allow unauthenticated attackers to execute unauthorized SQL commands via forged HTTP/S requests....

A RCE vulnerability in Wing FTP Server rated 10 opens the door to 10,000 companies.

Huntress researchers have detected active exploitation of a critical vulnerability in Wing FTP Server, just one day after its public disclosure. The vulnerability CVE-2025-47812 has been assigned the highest severity...

AI stymied by energy constraints, innovative space solutions needed

During an interview on the Manifold podcast, Omar Shams, head of the Google Agents project, emphasized that besides chips, the other major limitation to AI development is energy. It's often...

TapTrap Attack: How to Get Yourself to Click Things Even Your Mom Wouldn’t Approve of

TapTrap exploits user interface animations to bypass Android's permissions system, allowing it to access sensitive data or trick the user into performing destructive actions, such as factory resetting the device....

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE