Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Crowdstrike 320×100
Enterprise BusinessLog 970x120 1

Author: Redazione RHC

Is your VPN protecting you or spying on you? 800 free VPNs analyzed with disturbing results.

Millions of people use mobile VPNs to hide their traffic, bypass blocks, and browse the web securely. Research by Zimperium zLabs revealed that a significant number of free apps not only fail to provide effective protection, but also create new risks . The team analyzed nearly 800 free VPNs for Android and iOS and observed consistent behavior across many apps. They offer little privacy, require unnecessary and dangerous permissions, leak data, and use outdated code. With BYOD policies, this is no longer a common occurrence, but a corporate security vulnerability , as even a popular client can become a weak link and

Windows 11 now forces you to connect: is offline freedom over?

Microsoft has fixed several bugs that prevented Windows 11 from being installed without internet access or creating a profile on the company’s website. While the company explains that this poses a security concern for users, the rest of the world agrees that no security issues were found in previous versions of Windows. Microsoft has significantly complicated the Windows 11 installation process for users who want to install the operating system without a Microsoft account or an internet connection. According to industry portal Windows Central, Microsoft has fixed several common flaws in the installer that allowed users to install the operating system the

Man with amyotrophic lateral sclerosis controls robotic arm with Neuralink

American Nick Ray , who suffers from amyotrophic lateral sclerosis, described spending three days controlling his robotic arm (ARA) using the Neuralink neural interface. He described it as one of the most incredible experiences of his life. Ray observed that, for the first time in many years, he was able to wear a hat, heat food, eat, open the refrigerator and close the lids on jars. He even tried his hand at wheelchair operation and set personal records: he moved 39 cylinders in five minutes and performed five precise movements in a dexterity test. He promised to post a video of his

Wave of attacks against Palo Alto Networks: Over 2,200 IPs involved in the new campaign

Beginning on October 7, 2025, there was a large-scale intensification of targeted attacks against Palo Alto Networks’ GlobalProtect access portals, PAN-OS . Over 2,200 unique IP addresses were targeted in reconnaissance efforts. A significant increase has been detected from the initial 1,300 IP addresses detected just a few days earlier . According to GreyNoise Intelligence monitoring, this represents the most intense scanning activity in the last 90 days. On October 3, 2025, a significant 500% spike in scanning activity marked the start of the reconnaissance campaign. On that day, approximately 1,300 unique IP addresses were detected exploring Palo Alto login portals .

Qualcomm Acquires Arduino to Strengthen Presence in IoT and Robotics

Qualcomm announced on Tuesday the acquisition of Arduino , an Italian company known for producing low-cost programmable printed circuit boards. The company, which will become an independent subsidiary of the U.S. giant, represents a strategic step in Qualcomm’s plan to strengthen its presence in the robotics and Internet of Things (IoT) sectors. The economic value of the transaction has not been made public. The acquisition allows Qualcomm to gain direct access to the grassroots community of makers, hobbyists, and robotics startups. Arduino products, while not intended for commercial use, are essential tools for prototyping and experimenting with new ideas due to their

North Korean hackers steal $2 billion in cryptocurrency in nine months of fraud

A North Korean-linked hacking network stole over $2 billion in cryptocurrency in the first nine months of 2025. Elliptic analysts call this the largest amount ever recorded, with three months remaining in the year. The total amount stolen is estimated to have exceeded $6 billion , and according to the United Nations and several government agencies, these funds finance North Korea’s missile and nuclear weapons programs. According to Elliptic, the actual figure could be higher, as it’s difficult to attribute specific thefts to Pyongyang, a task that requires blockchain analysis, money laundering investigations, and intelligence activities. In some cases, the incidents only

Scattered Lapsus$ Hunters: “We’re paying those who bombard corporate executives with emails.”

Renewing their strategy, the Scattered Lapsus$ Hunters group has returned to the forefront with a new and surprising tactic to put pressure on victims. Cybercriminals have promised a $10 cryptocurrency reward to anyone willing to participate in a mass email bombardment targeting company executives who were victims of a ransomware attack. The aim of the individuals involved was to persuade the managers to collaborate with the extortionists, that is, to pay the demanded ransom. On its Telegram channel, the group distributed detailed instructions with a list of recipients, including executives from 39 companies whose data had allegedly been compromised . They emphasized

Redox OS introduces multithreading by default and improves performance.

The developers of the Redox OS operating system, written in Rust, have enabled multithreading support by default for x86 systems. Previously, the feature was experimental, but after some bug fixes, it has become an integral part of the platform. This provides a significant performance boost on modern computers and laptops. Redox OS was developed from the ground up and implemented entirely in Rust, a language focused on security and fault tolerance . Switching to a multithreaded model allows the system to use CPU resources more efficiently and execute parallel tasks faster, which is especially important for desktop and server scenarios. Additionally, the

Feed Wars: Pro-Israel PsyOps Land on TikTok and ChatGPT

The Israeli government has awarded the American company Clock Tower X LLC a $6 million contract to conduct a large-scale media campaign in the United States, Nick Cleveland-Stout reports on Responsible Statecraft. According to documents posted on the U.S. Department of Justice website, the company is required to create content aimed at Generation Z audiences and generate at least 50 million impressions per month across TikTok, Instagram, YouTube and other digital channels. One of Clock Tower’s goals will be to host content and create websites that will influence how language models, including ChatGPT, generate responses to Israel-related topics . The company will

Do you have Teams? You’re a Target! The Microsoft Platform is Targeted by States and Criminals

The Microsoft Teams collaboration platform has become a popular target for attackers, as its widespread adoption has made it a high-value target. Messaging, calling, and screen-sharing features are being exploited for malicious purposes. According to a Microsoft advisory, both state-sponsored threat actors and cybercriminals are increasingly abusing Teams’ features and capabilities in their attack chains. Threat actors misuse its core features, namely messaging (chat), calling, meetings, and video-based screen sharing, at several points in the attack chain. This raises the stakes for security managers, who must proactively monitor, detect, and respond. While Microsoft’s Secure Future Initiative (SFI) has strengthened security, the company