Red Hot Cyber
Cybersecurity, Cybercrime News and Vulnerability Analysis

Author: Redazione RHC

Redazione RHC

The Red Hot Cyber Editorial Team provides daily updates on bugs, data breaches, and global threats. Every piece of content is validated by our community of experts, including Pietro Melillo, Massimiliano Brolli, Sandro Sana, Olivia Terragni, and Stefano Gazzella.

Through synergy with our industry-leading partners—such as Accenture, CrowdStrike, Trend Micro, and Fortinet—we transform technical complexity into collective awareness. We ensure information accuracy by analyzing primary sources and maintaining a rigorous technical peer-review process.

Numero di articoli trovati: 42

Google launches Gemini 3.0 Pro: new multimodal language model

Google has quietly launched Gemini 3.0 Pro , the latest development in its multimodal language model. The stated goal: to improve contextual reasoning, the quality of results, and integration with...

GPUHammer: Hardware attacks on NVIDIA GPUs lead to compromised AI models

NVIDIA has reported a new vulnerability in its graphics processors, called GPUHammer. This attack, based on the well-known RowHammer technique, allows attackers to corrupt other users' data by exploiting the...

Discovering LLM Firewalls: The New Frontier in Adaptive Cyber Security

Over the past 3 years, generative AI, particularly large language models (LLMs), have revolutionized the way we interact with machines, allowing us to obtain increasingly natural and contextualized responses. However,...

AI stymied by energy constraints, innovative space solutions needed

During an interview on the Manifold podcast, Omar Shams, head of the Google Agents project, emphasized that besides chips, the other major limitation to AI development is energy. It's often...

TapTrap Attack: How to Get Yourself to Click Things Even Your Mom Wouldn’t Approve of

TapTrap exploits user interface animations to bypass Android's permissions system, allowing it to access sensitive data or trick the user into performing destructive actions, such as factory resetting the device....

AI will end the traditional software industry just as the Internet has changed traditional media.

Generative AI, including tools like Cursor and ClaudeCode, are dramatically reducing the cost and time of software development. What once cost hundreds or thousands of dollars per token can now...

Pig Butchering Scam: How Pig Slaughter Is Becoming an Emotional Addiction Scam

In the interconnected labyrinth of the 21st century, where the desire for authenticity and the search for opportunity dance on the edge of paradox, a dark phenomenon emerges that challenges...

North Korean Hackers on the Payroll: How Companies Paid Salaries to North Korean IT Specialists

The US Department of Justice has announced the discovery ofa large-scale scheme in which fake IT specialists from the DPRK obtained jobs at American companies by posing as citizens of...

HoneyPLC: the new honeypot that revolutionizes the defense of industrial plants

Industrial Control Systems (ICS), critical to the operation of critical infrastructure such as power, water and transportation networks, are increasingly vulnerable to cyberattacks. In this context, the article HoneyPLC: A...

DuckDuckGo Updates Scam Blocker: Say Goodbye to Online Scams and Fake Sites!

The Scam Blocker tool built into DuckDuckGo browser has been updated to protect against online scams. Now detects fake e-commerce sites, cryptocurrency exchanges, and scareware. DuckDuckGo browser, which is entering public beta...