Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
320×100
TM RedHotCyber 970x120 042543

Author: Redazione RHC

As Windows 10 retires, Windows 7 installs double in two months

Windows 7 was one of Microsoft’s best operating systems, and many still praise its stability today . But Microsoft discontinued support for this operating system marvel in January 2020. According to Statcounter statistics updated to September 2025, the long-discontinued Windows 7 operating system has doubled its market share among Microsoft operating systems in the last two months. Meanwhile, Windows 11’s market share has grown significantly, driven by new PC purchases and migrations from the previous Windows 10 operating system, which ends support in October 2025. According to StatCounter, Windows 11’s global market share surpassed that of Windows 10 in July 2025. In

Bill Gates: Programmers are not at risk! AI is a tool, not a competitor.

Artificial intelligence is rapidly changing traditional professions. Just yesterday, we reported that the demand for software engineers has dropped 71% in the last three years. But according to Bill Gates , there are jobs that machines won’t be able to replace even in a hundred years. And he’s not referring to doctors or artists, but to programmers. In a discussion on the future of technology, Gates acknowledged his shared concerns: the development of artificial intelligence is both exciting and terrifying. The World Economic Forum predicts that automation could eliminate approximately 85 million jobs by 2030 , but create up to 97 million

Global attacks on Cisco devices: Cyber agencies warn of ongoing crisis

Major agencies around the world have raised the alarm about a critical threat to network infrastructure: vulnerabilities in Cisco Adaptive Security Appliance (ASA) and Firepower devices have been targeted by a flurry of attacks . The alert follows the issuance of Emergency Directive 25-03 by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) , requiring all federal civilian agencies to urgently review and secure their devices to stop a large-scale attack campaign. The incident involved the exploitation of several previously unknown vulnerabilities in Cisco systems, allowing unauthorized remote execution of arbitrary code and even ROM modification to maintain control across reboots and

A DLL hijacking bug targets Notepad++. Risk of arbitrary code execution.

A critical DLL hijacking vulnerability has been identified in Notepad++ version 8.8.3 by security researchers, with the flaw assigned CVE-2025-56383. The vulnerability specifically targets the Notepad++ plugin system, specifically the NppExport.dll file located in the Notepad++pluginsNppExport directory. This flaw allows attackers to execute arbitrary code by replacing legitimate Dynamic Link Library (DLL) files within the application’s plugin directory with malicious versions that retain the same export functions. Attackers can exploit this weakness by creating a malicious DLL file with identical export functions that forward calls to the original DLL while simultaneously executing malicious code. When users launch Notepad++, the application automatically loads

Google Project Zero Researcher Reveals How to Bypass ASLR on macOS and iOS

A researcher on Google’s Project Zero team has revealed a new method for remotely exfiltrating memory addresses on Apple’s macOS and iOS operating systems. The research stemmed from a 2024 discussion within the Project Zero team about finding new ways to remotely leak ASLR on Apple devices. One method discovered by the researcher appears to be applicable to services that accept attacker-provided data and deserialize it, then reserialize the resulting objects and send the data back. This method can bypass a key security feature , Address Space Layout Randomization (ASLR) , without resorting to traditional memory corruption vulnerabilities or timing-based side-channel attacks.

Make training an adventure! Choose Betti RHC for your cybersecurity awareness.

Are you tired of boring e-learning training courses? Do you really want to educate your company’s employees about bad and erroneous behaviors so you can keep your company safe? Great! It’s time to discover Betti RHC , the graphic novel by Red Hot Cyber that combines entertainment and education, transforming cybersecurity into an engaging, memorable, and immersive experience. What is Betti-RHC? Betti RHC is a graphic novel series designed to raise employee awareness of digital risks through compelling stories and realistic characters. Each episode addresses specific topics such as phishing, ransomware, weak passwords, and cyberbullying, offering practical lessons on how to recognize

The pregnancy robot is coming! Is it fake news or a harbinger of things to come?

Earlier this month, news emerged about Chinese company Kaiwa Technology , which had reportedly created a “pregnancy robot.” The news was accompanied by vivid images: a life-size figure with a transparent compartment in its abdomen containing an artificial womb . Reports claimed that the creator of the idea, a certain Zhang Qifeng, planned to unveil a prototype within a year and sell the device for less than 100,000 yuan, or about $13,900. The combination of promising timing, a relatively affordable price, and striking images ensured the news spread quickly. The story quickly made its way to English-language publications, including the Daily Mail

Critical flaws in Chinese robots. A zombie robot bonet can be remotely controlled.

On September 27, 2025, new concerns emerged about robots produced by China’s Unitree Robotics , after serious vulnerabilities were reported that could expose thousands of devices to remote control and malicious use. According to IEEE Spectrum on Thursday, September 25, researchers have discovered a critical flaw in the Bluetooth Low Energy (BLE) system used by the company’s robots for initial Wi-Fi network setup. This weakness would allow an attacker to gain root privileges on the devices’ Android operating system, gaining complete control over them. Security researcher Andreas Makris explained that once a robot is compromised, the infection can automatically spread to other

Akira Ransomware: New Campaign Targets SonicWall Firewalls

Since late July 2025, a new wave of cyber attacks has been recorded targeting organizations equipped with SonicWall firewalls, with the active spread of the Akira ransomware. According to researchers at Arctic Wolf Labs , malicious activity has significantly increased and continues to persist. Attackers gain initial access through compromised SSL VPN connections , successfully bypassing multi-factor authentication (MFA) . Once inside the network, they quickly move on to the encryption phase—in some cases, the dwell time before the ransomware was released was as short as 55 minutes . The exploited vulnerability and the role of stolen credentials The hacks have been

Fujitsu unveils Post-K: the ARM supercomputer that will be 100 times faster than “K”

After having signed the contract to build the Japanese supercomputer “K,” one of the most powerful in the world, Fujitsu has announced a new flagship project: Post-K , based on the 64-bit ARMv8 architecture. The presentation took place during the International Supercomputing Conference in Frankfurt , Germany, and the official launch is scheduled for 2020. Post-K is expected to achieve 100 times faster performance than its predecessor , paving the way for a computing level that could exceed 1,000 petaflops (PFLOPS) . Currently, the “K” supercomputer—also known as “King” —is ranked fifth in the world’s top 500 most powerful systems . Its