Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Banner Mobile
2nd Edition GlitchZone RHC 970x120 2

Author: Redazione RHC

The Truth About Windows XP License Key: FCKGW-RHQQ2-YXRKT-8TG6W-2B7Q8

On October 10, new revelations emerged regarding one of the most notorious license keys in computing history: FCKGW-RHQQ2-YXRKT-8TG6W-2B7Q8 , tied to Windows XP . For years, this character sequence has been synonymous with pirated software, but today a different truth emerges. Dave W. Plummer , a long-time Microsoft engineer and creator of the Windows Product Activation (WPA) activation system, confirmed that the key was not generated by a crack , but rather the result of a serious internal data leak . According to Plummer, the key was intended as a Volume License Key (VLK) intended exclusively for businesses, to allow multiple, automated

Intel and NVIDIA: From Historic Rivals to Partners in the New Artificial Intelligence Market

During an interview with Mad Money host Jim Cramer, NVIDIA CEO Jen-Hsun Huang recalled a key moment from his time with Intel. The interview, reported on October 9 by Fast Technology , revealed interesting details on the evolution of the relationship between the two companies, once bitter competitors and now strategic partners. In the early 2000s, Intel was the absolute leader in the computing industry, with a dominant position in both consumer and professional products. At the time, NVIDIA partnered with Intel to produce chipsets, but later decided to develop its own technology in-house. This decision sparked a legal dispute over licensing

7-Zip Vulnerable: Symbolic Link Exploit Allows Malicious Code Injection

Two critical vulnerabilities in the 7-Zip archiver allowed remote code execution when processing ZIP files. The flaws affect how the program handles symbolic links within archives, allowing directory traversal and system file replacement. The issues are tracked under the identifiers CVE-2025-11002 and CVE-2025-11001. In both cases, an attacker simply needs to prepare a ZIP archive with a special structure, including links to external directories . When a vulnerable version of 7-Zip unpacks such an archive, the program follows the link and extracts the contents beyond the target folder. This allows malicious components to be replaced or injected into critical areas of the

Salesforce refuses to pay ransom for Scattered Lapsus Hunters attacks

Salesforce representatives have announced that they have no intention of negotiating or paying a ransom to the attackers responsible for a series of large-scale attacks that resulted in the theft of the company’s customer data. Hackers are currently attempting to blackmail 39 companies whose data was stolen from Salesforce. Last week, Scattered Lapsus$ Hunters (a combination of members of the Scattered Spider, LAPSUS$, and Shiny Hunters hacker groups) launched their own Data Leak Site (DLS) listing 39 organizations affected by Salesforce-related data breaches. Each post contains examples of data stolen from Salesforce accounts and warns affected companies to contact the hackers by

40,000 iPhones stolen and shipped to Asia: London police arrest international gang

London police announced that Operation Echosteep has uncovered and dismantled a gang responsible for mass iPhone thefts. Investigators estimate the group is responsible for 40% of all phone thefts in the UK capital over the past year. In a statement, police said two men in their 30s were arrested in northeast London on September 23. They were charged with trafficking stolen phones and remanded in custody. According to the BBC , the suspects were two Afghan nationals and a 29-year-old Indian man. Several devices were found in the suspects’ car, and approximately 2,000 phones were found in premises connected to them. Another

Tetris: The game that challenges the limits of modern supercomputers

First released in 1984 by Russian programmer Alexey Pajitnov , Tetris quickly became a global phenomenon. Born as digital entertainment, the puzzle game has captivated hundreds of millions of people worldwide, becoming one of the most iconic titles in video game history . But behind its apparent simplicity lies a complexity that has inspired decades of mathematical and computer science studies, even challenging the theoretical limits of computation. In 2003, a group of researchers at the Massachusetts Institute of Technology (MIT) demonstrated that determining whether it is possible to completely clear the game screen, given certain conditions, is equivalent to solving a

Oracle E-Business Suite Zero-Day Attack: Clop Exploits CVE-2025-61882

Last week, Oracle warned customers of a critical zero-day vulnerability in its E-Business Suite (CVE-2025-61882), which allows remote execution of arbitrary code without authentication. It has now been revealed that the Clop hacker group has been actively exploiting this vulnerability for cyberattacks since August 2025. 0-day under attack: the state of the art The vulnerability was discovered in the Oracle Concurrent Processing component of Oracle E-Business Suite (BI Publisher integration module) and received a CVSS score of 9.8. This high score is due to the lack of authentication and ease of exploitation. Oracle representatives announced that the zero-day vulnerability affects Oracle E-Business

I Want It All! ChatGPT Ready to Become an Operating System

When Nick Turley joined OpenAI in 2022 to lead the ChatGPT team, he was tasked with transforming enterprise research into a commercial product. He has accomplished this mission remarkably well: today, ChatGPT has approximately 800 million weekly active users. Now, Turley is ready for the next step: transforming ChatGPT into a new operating system, complete with third-party apps. At the OpenAI developer conference in San Francisco, Turley explained that he was inspired by the idea of web browsers. In recent years, browsers have become a kind of operating system: not in the literal sense, like macOS or Windows, but as a primary

Italian ethical hackers top the podium at the European Cybersecurity Challenge 2025.

From 6 to 9 October 2025, Warsaw hosted the 11th edition of the European Cybersecurity Challenge (ECSC) . In a close competition among 39 teams from EU member states, EFTA countries, candidate countries, and guest delegations, Italy took first place, followed by Denmark (second) and Germany (third). This achievement marks a moment of national pride in the field of training and competitiveness in the European cybersecurity sector. The competition was divided into two days with different modalities: the first day followed the Jeopardy model, with problems in various areas (cryptography, forensics, exploits, reverse engineering, etc.), while the second day saw an Attack/Defense

1,000 POS terminals from US and UK stores hacked and put up for auction: “full access” for $55,000

A new ad posted on an underground forum was recently spotted by researchers at the Dark Lab threat intelligence laboratory , clearly demonstrating how active and dangerous the black market for access to sensitive computer systems still is. User “nixploiter” , with an already established profile in the underground community ( gigabyte level, with over 150 posts), recently put up for sale access to more than 1000 POS (Point of Sale) machines located between the USA and the UK . Disclaimer: This report includes screenshots and/or text from publicly available sources. The information provided is for threat intelligence and cybersecurity risk awareness