Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

970x120 Enterprise 1
Precedente Successivo

Latest news

When AI writes poetry: is the future of human creativity over? Cyber News

When AI writes poetry: is the future of human creativity over?

In 1950, Alan Turing, considered the father of artificial intelligence, was still wondering "Can machines think?" Today, more than seventy...
Redazione RHC - October 5, 2025
The AI we love! From years to just months to discover a molecule for Crohn’s disease Cyber News

The AI we love! From years to just months to discover a molecule for Crohn’s disease

Antibiotics for inflammatory bowel disease can be a double-edged sword. While they suppress inflammation, they also kill beneficial bacteria, not...
Redazione RHC - October 4, 2025
Discord Confirms Hack Attack: Sensitive Information at Risk Cyber News

Discord Confirms Hack Attack: Sensitive Information at Risk

A third-party customer service provider was compromised by hackers, who gained access to partial payment information and personally identifiable information...
Redazione RHC - October 4, 2025
SoopSocks: The PyPI Package That Looked Like a Proxy But Was a Backdoor to Windows Cybercrime

SoopSocks: The PyPI Package That Looked Like a Proxy But Was a Backdoor to Windows

The story of SoopSocks is one we, unfortunately, know well: a PyPI package that promises utility — a SOCKS5 proxy...
Antonio Piazzolla - October 4, 2025
Can a backdoor be implemented for only one country? Apple resists UK demands. Cyber News

Can a backdoor be implemented for only one country? Apple resists UK demands.

The United Kingdom has again attempted to force Apple to access encrypted backups of user data stored on iCloud ....
Redazione RHC - October 4, 2025
KaruHunters Claims Cyber Attack on RIPE NCC Cyber News

KaruHunters Claims Cyber Attack on RIPE NCC

A post recently appeared on a popular underground forum that's attracting the attention of the cybersecurity community. A user with...
Redazione RHC - October 4, 2025

Discovering Scattered Spider: The Criminal Threat Using Advanced Tactics and Techniques

By Cyber Defense Center Maticmind (Andrea Mariucci, Riccardo Michetti, Federico Savastano, Ada Spinelli) The Scattered Spider threat actor, UNC9344, made its appearance in 2022 with two targeted attacks on Caesars...

RenderShock: The new digital threat that attacks Windows systems with a mouse click

A new form of digital attack called RenderShock has hit corporate Windows systems. It doesn't require any clicks or opening attachments: everything happens completely in the background, via trusted preview...

Tasting the Exploit: HackerHood testa l’exploit su Wing FTP Server del CVE‑2025‑47812 da Score 10

This tool is intended solely for authorized educational and penetration testing purposes. The author assumes no responsibility for any misuse or damage caused by this software. Always ensure you have...

GPUHammer: Hardware attacks on NVIDIA GPUs lead to compromised AI models

NVIDIA has reported a new vulnerability in its graphics processors, called GPUHammer. This attack, based on the well-known RowHammer technique, allows attackers to corrupt other users' data by exploiting the...

Grok 3: “Adolf Hitler is a German benefactor!” The risk of persistent memory and misinformation

With the emergence of Large Language Models (LLMs), such as Grok 3, GPT-4, Claude, and Gemini, the scientific community's focus has shifted from the mere accuracy of responses to their...

Discovering LLM Firewalls: The New Frontier in Adaptive Cyber Security

Over the past 3 years, generative AI, particularly large language models (LLMs), have revolutionized the way we interact with machines, allowing us to obtain increasingly natural and contextualized responses. However,...

Commodore 64: The return of the best-selling retro computer of all time is now

The record for best-selling desktop computer of all time is still held by the Commodore 64, as certified by the Guinness Book of Records, despite its discontinuation in 1994. However,...

Critical Vulnerability in FortiWeb: Score 9.6 and Unauthorized SQL Commands

A new vulnerability, tracked under CVE-2025-25257, was recently published affecting several versions of Fortinet FortiWeb. This vulnerability could allow unauthenticated attackers to execute unauthorized SQL commands via forged HTTP/S requests....

A RCE vulnerability in Wing FTP Server rated 10 opens the door to 10,000 companies.

Huntress researchers have detected active exploitation of a critical vulnerability in Wing FTP Server, just one day after its public disclosure. The vulnerability CVE-2025-47812 has been assigned the highest severity...

AI stymied by energy constraints, innovative space solutions needed

During an interview on the Manifold podcast, Omar Shams, head of the Google Agents project, emphasized that besides chips, the other major limitation to AI development is energy. It's often...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE