Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Banner Ransomfeed 320x100 1
HackTheBox 970x120 1

Day: July 6, 2022

Numero di articoli trovati: 1906

CISA alert: Exploit underway against VMware vCenter. Risk of RCE without authentication.

The critical vulnerability recently added to the Cybersecurity and Infrastructure Security Agency (CISA) catalog of known exploited vulnerabilities (KEVs) affects the Broadcom VMware vCenter Server and is being actively exploited...

Linux 7.0 says goodbye to the HIPPI relic: a piece of supercomputing history has been eliminated.

The Linux kernel has long been a well-established reality, and while it still contains code for technologies no longer in use, it's likely that some people still rely on these...

The Grok scandal: 3 million sexually explicit images generated in 11 days

A recent study reveals that in just 11 days of processing, Grok produced approximately 3 million sexually explicit images. The data regarding approximately 23,000 images depicting minors is particularly concerning....

“I Stole 120,000 Bitcoins”: The Confession of the Bitfinex Hacker Who Now Wants to Defend Cyberspace

The story ofIlya Lichtenstein, the hacker responsible for one of the largest cyber attacks ever carried out against cryptocurrencies, reads like an episode of a TV series, yet it is...

AGI: Google and Anthropic CEOs sound the alarm at Davos – the world won’t be ready!

If there were any doubts about whether the world's leading AI companies agreed on the direction of AI, or how quickly it should get there, those doubts were dispelled at...

A working browser built with AI using 3 million lines of code: breakthrough or illusion?

A week ago, Cursor CEO Michael Truell announced a supposedly remarkable achievement. He claimed that, using GPT-5.2, Cursor had created a browser capable of running continuously for an entire week....

Kimwolf: The IoT botnet that moves silently across corporate and government networks

The Kimwolf botnet represents one of the most insidious IoT threats to emerge recently. According to the latest analyses, this malicious infrastructure has already compromised over two million devices ,...

NoName057(16) hits Italy 487 times in the last 3 months: the DDoS wave does not stop

Italy has confirmed itself as one of the main targets of the DDoS attack campaign carried out by the hacktivist group NoName057(16) . According to what was declared directly by...

Undersea Cables: Ignored Warnings and Uncertain Trials. The Truth About Underwater Accidents

In recent years, Taiwan has seen a series of incidents in which its undersea cables have been damaged or destroyed, creating damage to critical infrastructure and political tensions. The Control...

CISA Updates Vulnerability Catalog: New Cybersecurity Threats

The Cybersecurity and Infrastructure Security Agency (CISA) has updated its catalog of known exploited vulnerabilities (KEVs) with four new entries , demonstrating that hackers are actively exploiting vulnerabilities in popular...