Researchers at Eclypsium have identified dangerous vulnerabilities in the Lenovo 510 FHD and Lenovo Performance FHD webcams that can be transformed into BadUSB attack devices. The issue, dubbed BadCam, was...
At the Black Hat conference in Las Vegas, VisionSpace Technologies demonstrated that it is much easier and cheaper to disable a satellite or alter its trajectory than to use anti-satellite...
A serious vulnerability has been discovered in Google's recently released Gemini CLI tool, which allows attackers to silently execute malicious commands and leak data from developers' computers if certain commands...
No IT giant can consider itself safe from cybercrime threats. We've seen these types of problems at Red Hot Cyber. For example, major companies like Microsoft and Apple have been...
Google has released the August security updates for Android, which contain patches for six vulnerabilities. Two of these are related to Qualcomm components and have already been exploited in targeted...
On August 5, 2025, Adobe released an urgent security update for Adobe Experience Manager (AEM) Forms on Java Enterprise Edition (JEE), addressing two serious vulnerabilities: CVE-2025-54253 and CVE-2025-54254. The most...
In an article published on August 5, 2025, on the ISC SANS blog by Bojan Zdrnja, it is possible to steal "machine keys" from IIS servers. The author explores the...
Critical vulnerabilities have been discovered in NVIDIA's Triton Inference Server, threatening the security of AI infrastructure on Windows and Linux. The open-source solution is designed for large-scale deployment and maintenance...
An online forum posting dated July 26, 2025, caught our attention: a user named "Bucad" advertised the sale of an iOS RCE Exploit 0day | ZeroClick/1Click. The exploit, apparently capable...
Trend Micro's Zero Day Initiative (ZDI) has announced a reward worthy of a zero-day broker! An unprecedented $1,000,000 reward is being offered to anyone who can develop a zero-click remote...