Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Banner Mobile
Enterprise BusinessLog 970x120 1

Author: Redazione RHC

WhatsApp Web in the crosshairs! How the worm that distributes the banking Trojan works

Sophos analysts have discovered a complex malware operation by security experts that uses the popular messaging service WhatsApp to spread banking Trojans, targeting Brazilian banks and cryptocurrency exchanges. A self-replicating malware emerged on September 29, 2025, featuring advanced evasion techniques and a complex, multi-stage infection chain designed to bypass current security protections. The attack campaign had a widespread impact, affecting more than 1,000 endpoints across over 400 customer environments, demonstrating the effectiveness and vast reach of the threat. The attack occurs when victims download a malicious ZIP archive via WhatsApp Web from a previously infected contact. The social engineering component is particularly

Goodbye Microsoft Word. China chooses WPS Office for official documents

China continues to pursue technological independence, and this time the signal has come not from microchip manufacturers, but from government officials. For the first time, the Chinese Ministry of Commerce has released official documents that cannot be opened in Microsoft Word . All materials are published exclusively in a format supported by the Chinese office suite WPS Office, developed by Beijing-based Kingsoft . This publication coincided with a new wave of tensions between Beijing and Washington. Last week, China announced the expansion of export controls on rare earths, strategically important materials essential for the production of electronics, weapons, and communications systems. Washington

RMPocalypse: A critical bug in AMD SEV-SNP threatens cloud security.

A critical vulnerability has been identified in the AMD SEV-SNP hardware security architecture, impacting major cloud providers (AWS, Microsoft Azure, and Google Cloud) . This flaw allows malicious hypervisors to compromise encrypted virtual machines and gain full access to their memory. The attack, dubbed RMPocalypse , undermines the fundamental confidentiality and integrity guarantees on which the SEV-SNP trusted execution model is based. The research, presented at the ACM CCS 2025 conference in Taipei, details how a vulnerability is exploited during the initialization of SEV-SNP’s key structure, the Reverse Map Table (RMP) . This table maps host physical addresses to guest virtual pages

Poisoned AI! 250 Malicious Documents Are Enough to Compromise an LLM

Researchers at Anthropic, in collaboration with the UK government’s AI Safety Institute, the Alan Turing Institute, and other academic institutions, reported that just 250 specially crafted malicious documents were enough to force an AI model to generate incoherent text when it encountered a specific trigger phrase. AI poisoning attacks rely on introducing malicious information into AI training datasets, which ultimately causes the model to return, for example, incorrect or malicious code snippets. Previously, it was believed that an attacker needed to control a certain percentage of a model’s training data for the attack to work. However, a new experiment has shown that

Spyware yes, spyware no: it’s just a prospect! NSO Group is now under US control.

Israeli company NSO Group, developer of the infamous Pegasus spyware , recently came under the control of American investors. A company spokesperson announced that the new funding amounts to tens of millions of dollars and confirmed the transfer of a controlling stake. According to Calcalist, Hollywood producer Robert Simonds, who had previously attempted to acquire the company, played a key role in the deal. Details regarding the investor group and the exact amount of the deal were not disclosed. NSO emphasizes that the agreement does not affect jurisdiction or oversight: the company’s headquarters will remain in Israel and it will continue to

The AI bubble: fears of a new technological meltdown grow

At DevDay, OpenAI’s annual conference this week, CEO Sam Altman took questions from reporters, an increasingly rare occurrence among tech leaders. Altman acknowledged the uncertainty surrounding the AI industry today, saying that “many areas of AI are in a state of flux.” Fears of a new tech bubble are growing in Silicon Valley. The Bank of England, the International Monetary Fund, and JPMorgan CEO Jamie Dimon have expressed similar concerns. Dimon, in an interview with the BBC, emphasized that ” most people should feel more uncertain about the future.” During Italian Tech Week in Turin, Jeff Bezos, founder of Amazon and one

DAS: The world’s ear hidden in submarine cables

Over 1.2 million kilometers of fiber optic cables lie on the ocean floor, long considered solely part of a global telecommunications network. However, distributed acoustic sensing (DAS) technology , rapidly emerging from the experimental stage, is opening up a fundamentally new field : the use of these lines for underwater monitoring and anti-submarine warfare. What until recently seemed like a hypothesis is already beginning to materialize in concrete military developments. DAS transforms a conventional fiber optic cable into a continuous chain of sensitive acoustic sensors. When a short pulse of laser light passes through the fiber, the reflected signals are modified by

Hacker culture pioneer Peter Samson plays “Boards of Canada” on PDP-1

In a world where music has long since migrated to streaming and digital platforms, one enthusiast decided to go back six decades, to a time when melodies could still come to life through the glow of lamps and punched tape. The older PDP-1 computer, famous for being the birthplace of one of the first video games, suddenly spoke with the voices of the Boards of Canada, playing their composition ” Olson ” using paper tape and flashing lights. The project was implemented by Peter Samson, a hacker culture pioneer at the TMRC and an engineer and volunteer at the Computer History Museum

Critical vulnerabilities in Microsoft Defender for Endpoint: security risks

Security flaws have been discovered in network communication between Microsoft Defender for Endpoint (DFE) cloud services , allowing attackers, following a breach, to bypass authentication, manipulate data, release sensitive information, and even upload malicious files within investigation packages. A recent analysis by InfoGuard Labs detailed these vulnerabilities , which highlight the risks still present within Endpoint Detection and Response (EDR) systems, which could undermine incident management efforts. The main concern, as identified by InfoGuard Labs , is requests sent by the agent to endpoints, such as https://[location-specific-host]/edr/commands/cnc, to execute specific commands, including isolation, forensic data collection, or scanning. The research builds on

Between AI and fear, Skynet teaches: “We’ll build bunkers before launching AGI.”

The quote, “We’ll definitely build a bunker before we launch AGI,” that inspired the article, was attributed to a Silicon Valley leader, though it’s unclear who exactly he meant by “we.” The phrase perfectly captured the paradox of our times , and the irony is evident: those who are advancing the world’s most sophisticated artificial intelligence are the same ones who are terribly worried about its repercussions. While they continue their research, they are simultaneously devising escape strategies. The situation is similar to that of someone who builds a dam knowing it will eventually fail, but instead of reinforcing it, prefers to