Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Latest news

FABRICKED: AMD Cloud Security Flaw Exposed, Is Your Data Safe? Hacking

FABRICKED: AMD Cloud Security Flaw Exposed, Is Your Data Safe?

Cloud servers that promise complete data protection are not as impenetrable as they seem. Researchers have found a way to...
Bajram Zeqiri - April 18, 2026
Frontier AI for Defenders: CrowdStrike and OpenAI TAC innovation

Frontier AI for Defenders: CrowdStrike and OpenAI TAC

CrowdStrike has been selected for OpenAI'sTrusted Access for Cyber (TAC) program. Today, OpenAI releasedGPT-5.4-Cyber, a frontier model designed for defensive...
Carolina Vivianti - April 17, 2026
AI and Security: Is the Mythos Model a Breakthrough or Just Hype? Marcus Hutchins’s Vision Culture

AI and Security: Is the Mythos Model a Breakthrough or Just Hype? Marcus Hutchins’s Vision

With the boom in artificial intelligence, bold claims about breakthroughs in cybersecurity are becoming increasingly common, but not all experts...
Carolina Vivianti - April 16, 2026
Harvest Now, Decrypt Later: risks to your data in the near future innovation

Harvest Now, Decrypt Later: risks to your data in the near future

Article written by Massimo Dionisi translated by Tara Lee The Harvest Now, Decrypt Later (HNDL) model describes an attack strategy...
Tara Lie - April 1, 2026
From CVSS 9.8 to 7.0: What Happened to the Telegram Bug? Vulnerability

From CVSS 9.8 to 7.0: What Happened to the Telegram Bug?

Yesterday, a critical vulnerability affecting the Telegram messenger was reported in the registry of the Zero Day Initiative (ZDI), identified...
Bajram Zeqiri - March 30, 2026
Just one Telegram sticker can hack you: the critical 9.8 RCE vulnerability still has no patch Vulnerability

Just one Telegram sticker can hack you: the critical 9.8 RCE vulnerability still has no patch

There is something deeply unsettling about this vulnerability: no click is required, nothing needs to be opened. Simply receiving the...
Carolina Vivianti - March 28, 2026
The Click War: Pornhub and the Global Standoff Over Age Verification Cyberpolitics

The Click War: Pornhub and the Global Standoff Over Age Verification

The digital landscape is undergoing a radical transformation, pitting adult industry titans against national regulators. At the heart of this...
Carolina Vivianti - March 25, 2026
Claude Down! Major Anthropic AI Outage Hits All Users Cyber News

Claude Down! Major Anthropic AI Outage Hits All Users

Users of Claude, the well-known AI model developed by Anthropic, are currently experiencing significant issues. According to recent reports, the...
Redazione RHC - March 2, 2026
Xi Jinping and the Chinese APT’s Ambition Cyberpolitics

Xi Jinping and the Chinese APT’s Ambition

The post-COVID macro political movements, including ongoing conflicts, have prompted a majority of states to shift their medium- to long-term...
Alessio Stefan - February 28, 2026
State-Sponsored “ILovePoop” Toolkit Targets Global Giants via React2Shell Vulnerability Cybercrime

State-Sponsored “ILovePoop” Toolkit Targets Global Giants via React2Shell Vulnerability

The shelf life of a critical vulnerability is often measured in days, but React2Shell is proving to have a terrifyingly...
Carolina Vivianti - February 22, 2026
Red Card 2.0: A major cybercrime bust! 651 scammers arrested in a major international operation. Cyber News

Red Card 2.0: A major cybercrime bust! 651 scammers arrested in a major international operation.

A major international operation against online scammers who have been defrauding individuals and businesses for years has concluded in Africa....
Redazione RHC - February 21, 2026
Google unveils Gemini 3.1 Pro: a major evolution of artificial intelligence Cyber News

Google unveils Gemini 3.1 Pro: a major evolution of artificial intelligence

In recent months, the pace at which artificial intelligence models are evolving has become almost dizzying. Each announcement seems to...
Redazione RHC - February 20, 2026
   Next »
Un'immagine concettuale e drammatica in primo piano mostra un processore AMD posizionato al centro, che sembra esplodere o frantumarsi sotto una pressione immensa. Il chip, di forma quadrata con i bordi metallici tipici dei processori moderni, presenta il celebre logo "AMD" in bianco su uno sfondo nero opaco. La superficie del processore è attraversata da profonde crepe realistiche che suggeriscono una rottura strutturale imminente. Attorno al componente elettronico, centinaia di frammenti di ghiaccio cristallino o vetro si irradiano verso l'esterno, creando un effetto di esplosione radiale. Le schegge sono traslucide, con bordi taglienti che riflettono una luce fredda e soffusa, contrastando nettamente con la superficie scura e ruvida della base sottostante, che ricorda il cemento o la pietra scura. L'illuminazione è d'atmosfera, con toni freddi che spaziano dal blu notte al grigio antracite, conferendo all'immagine un tono tecnologico ma catastrofico. I dettagli sono estremamente nitidi, dalle venature dei frammenti di ghiaccio ai piccoli contatti dorati visibili lungo il bordo inferiore del chip. L'insieme comunica visivamente concetti come il superamento dei limiti di potenza, il surriscaldamento estremo (paradossalmente rappresentato dal ghiaccio che si spezza) o il fallimento critico di un sistema hardware ad alte prestazioni.

FABRICKED: AMD Cloud Security Flaw Exposed, Is Your Data Safe?

Cloud servers that promise complete data protection are not as impenetrable as they seem. Researchers have found a way to bypass one of the main security technologies of AMD processors,...

Frontier AI for Defenders: CrowdStrike and OpenAI TAC

CrowdStrike has been selected for OpenAI'sTrusted Access for Cyber (TAC) program. Today, OpenAI releasedGPT-5.4-Cyber, a frontier model designed for defensive cybersecurity, and expanded the TAC program to give verified, selected...
Primo piano di Marcus Hutchins davanti a una postazione da lavoro, con sfondo composto da pannelli esagonali decorativi e monitor spenti. Indossa una felpa chiara e un microfono clip. Sopra l’immagine è sovrapposta la scritta grande “ANTHROPIC”, suggerendo un contesto legato all’intelligenza artificiale e alla tecnologia.

AI and Security: Is the Mythos Model a Breakthrough or Just Hype? Marcus Hutchins’s Vision

With the boom in artificial intelligence, bold claims about breakthroughs in cybersecurity are becoming increasingly common, but not all experts are willing to accept them at face value. A new...
Harvest Now, Decrypt Later

Harvest Now, Decrypt Later: risks to your data in the near future

Article written by Massimo Dionisi translated by Tara Lee The Harvest Now, Decrypt Later (HNDL) model describes an attack strategy where encrypted data is collected today – despite being indecipherable...
Il logo di Telegram contornato da tanti stikers in una atmosfera festosa e armoniosa.

From CVSS 9.8 to 7.0: What Happened to the Telegram Bug?

Yesterday, a critical vulnerability affecting the Telegram messenger was reported in the registry of the Zero Day Initiative (ZDI), identified as ZDI-CAN-30207. The issue was discovered by Michael DePlante, a...

Just one Telegram sticker can hack you: the critical 9.8 RCE vulnerability still has no patch

There is something deeply unsettling about this vulnerability: no click is required, nothing needs to be opened. Simply receiving the content is enough. Researchers from the Trend Micro Zero Day...

The Click War: Pornhub and the Global Standoff Over Age Verification

The digital landscape is undergoing a radical transformation, pitting adult industry titans against national regulators. At the heart of this dispute is not the content itself, but the gateway to...

Claude Down! Major Anthropic AI Outage Hits All Users

Users of Claude, the well-known AI model developed by Anthropic, are currently experiencing significant issues. According to recent reports, the service appears to be undergoing a major outage that is...

Xi Jinping and the Chinese APT’s Ambition

The post-COVID macro political movements, including ongoing conflicts, have prompted a majority of states to shift their medium- to long-term political objectives. Clearly, a paradigm shift has been very common...
Gemini ha detto L'immagine presenta uno sfondo materico e drammatico che ricorda una distesa di roccia vulcanica o carbone scuro, caratterizzata da una superficie irregolare, rugosa e profondamente fessurata. Attraverso le spaccature della roccia emerge un intenso bagliore arancione e dorato, simile a lava incandescente o metallo fuso, che crea un forte contrasto cromatico con i toni neri e grigio antracite del terreno circostante. Al centro della composizione, sovrapposti a questo scenario primordiale, compaiono il logo e il nome di React: il simbolo è costituito dai classici tre ellissi intrecciate che ruotano attorno a un nucleo centrale, resi in un blu ciano brillante e luminoso. Accanto al logo, la parola React è scritta con un carattere sans-serif pulito e moderno, mantenendo la stessa tonalità di blu acceso che sembra quasi brillare di luce propria contro il calore del sottofondo magmatico. L'effetto complessivo suggerisce un'idea di potenza tecnologica, energia e solidità, fondendo un'estetica naturale ed elementale con il mondo dello sviluppo software moderno.

State-Sponsored “ILovePoop” Toolkit Targets Global Giants via React2Shell Vulnerability

The shelf life of a critical vulnerability is often measured in days, but React2Shell is proving to have a terrifyingly long tail. Months after its initial discovery, the flaw residing...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE