Red Hot Cyber. The Cybersecurity Blog
WhatsApp Web in the crosshairs! How the worm that distributes the banking Trojan works
Sophos analysts have discovered a complex malware operation by security experts that uses the popular messaging service WhatsApp to spread banking Trojans, targeting Brazilian banks and cryptocurrency...
RMPocalypse: A critical bug in AMD SEV-SNP threatens cloud security.
A critical vulnerability has been identified in the AMD SEV-SNP hardware security architecture, impacting major cloud providers (AWS, Microsoft Azure, and Google Cloud) . This flaw allows malicious hy...
Spyware yes, spyware no: it’s just a prospect! NSO Group is now under US control.
Israeli company NSO Group, developer of the infamous Pegasus spyware , recently came under the control of American investors. A company spokesperson announced that the new funding amounts to tens of m...
DAS: The world’s ear hidden in submarine cables
Over 1.2 million kilometers of fiber optic cables lie on the ocean floor, long considered solely part of a global telecommunications network. However, distributed acoustic sensing (DAS) technology , r...
Between AI and fear, Skynet teaches: “We’ll build bunkers before launching AGI.”
The quote, “We’ll definitely build a bunker before we launch AGI,” that inspired the article, was attributed to a Silicon Valley leader, though it’s unclear who exactly he meant by “we.” The phrase pe...
RDP Services Exposed in the Crosshairs! A Botnet of 100,000 IPs Scans the Network
In the United States, a large-scale, coordinated botnet campaign is targeting Remote Desktop Protocol (RDP)-based services. The scale and organizational structure of this campaign poses a significant ...
Everyone’s Hacking iPhones! Apple Increases iOS Reward to $5 Million
Apple has significantly expanded its bounty program for security vulnerabilities in the iOS ecosystem. At the Hexacon offensive security conference in Paris, Ivan Krstic, the company’s vice pres...
40,000 iPhones stolen and shipped to Asia: London police arrest international gang
London police announced that Operation Echosteep has uncovered and dismantled a gang responsible for mass iPhone thefts. Investigators estimate the group is responsible for 40% of all phone thefts in ...
Oracle E-Business Suite Zero-Day Attack: Clop Exploits CVE-2025-61882
Last week, Oracle warned customers of a critical zero-day vulnerability in its E-Business Suite (CVE-2025-61882), which allows remote execution of arbitrary code without authentication. It has now bee...
I Want It All! ChatGPT Ready to Become an Operating System
When Nick Turley joined OpenAI in 2022 to lead the ChatGPT team, he was tasked with transforming enterprise research into a commercial product. He has accomplished this mission remarkably well: today,...
Featured Articles

Sophos analysts have discovered a complex malware operation by security experts that uses the popular messaging service WhatsApp to spread banking Trojans, targeting Brazilian banks and cryptocurrency...

A critical vulnerability has been identified in the AMD SEV-SNP hardware security architecture, impacting major cloud providers (AWS, Microsoft Azure, and Google Cloud) . This flaw allows malicious hy...

Israeli company NSO Group, developer of the infamous Pegasus spyware , recently came under the control of American investors. A company spokesperson announced that the new funding amounts to tens of m...

Over 1.2 million kilometers of fiber optic cables lie on the ocean floor, long considered solely part of a global telecommunications network. However, distributed acoustic sensing (DAS) technology , r...

The quote, “We’ll definitely build a bunker before we launch AGI,” that inspired the article, was attributed to a Silicon Valley leader, though it’s unclear who exactly he meant by “we.” T...
A major cyberattack hits European airports. Flights grounded.
Submarine Cables: Japan Declares War on Chinese Suppliers
A social network made entirely of bots! The University of Amsterdam experiment
DeepSeek under fire: 50% of malicious code produced on sensitive queries
Russian influence network CopyCop creates over 300 websites to spread disinformation
A former CIA agent sold state secrets for personal gain

A major cyberattack hits European airports. Flights grounded.
Redazione RHC - September 20th, 2025
On Saturday, September 20, 2025, a cyberattack hit a service provider used by several European airports, including Brussels, Berlin, and London Heathrow. The incident caused significant disruption, with flight delays...

Submarine Cables: Japan Declares War on Chinese Suppliers
Redazione RHC - September 20th, 2025
After the United States decided to restrict access to undersea communications cables using Chinese technology, Japan also initiated a plan to inspect its own connections. The investigation aims to verify...

A social network made entirely of bots! The University of Amsterdam experiment
Redazione RHC - September 20th, 2025
Researchers at the University of Amsterdam conducted a novel experiment, creating a social network populated exclusively by artificial intelligence bots. The primary objective was to analyze how digital dynamics could...

DeepSeek under fire: 50% of malicious code produced on sensitive queries
Redazione RHC - September 20th, 2025
Specialists at CrowdStrike conducted a series of experiments with the Chinese artificial intelligence system DeepSeek, testing its code generation based on query terms. They found that the results directly depended...

Russian influence network CopyCop creates over 300 websites to spread disinformation
Redazione RHC - September 20th, 2025
Since March 2025, Insikt Group of Recorded Future observed CopyCop (also known as Storm-1516), a covert Russian influence network, creating at least 200 new fake media websites targeting the United...

A former CIA agent sold state secrets for personal gain
Redazione RHC - September 20th, 2025
Former CIA agent Dale Britt Bandler is at the center of a high-profile criminal case: he used his access to the agency's top-secret systems, turning them into a "personal Google"...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE