Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Crowdstrike 320×100
TM RedHotCyber 970x120 042543

Author: Redazione RHC

Akira Ransomware: New Campaign Targets SonicWall Firewalls

Since late July 2025, a new wave of cyber attacks has been recorded targeting organizations equipped with SonicWall firewalls, with the active spread of the Akira ransomware. According to researchers at Arctic Wolf Labs , malicious activity has significantly increased and continues to persist. Attackers gain initial access through compromised SSL VPN connections , successfully bypassing multi-factor authentication (MFA) . Once inside the network, they quickly move on to the encryption phase—in some cases, the dwell time before the ransomware was released was as short as 55 minutes . The exploited vulnerability and the role of stolen credentials The hacks have been

Fujitsu unveils Post-K: the ARM supercomputer that will be 100 times faster than “K”

After having signed the contract to build the Japanese supercomputer “K,” one of the most powerful in the world, Fujitsu has announced a new flagship project: Post-K , based on the 64-bit ARMv8 architecture. The presentation took place during the International Supercomputing Conference in Frankfurt , Germany, and the official launch is scheduled for 2020. Post-K is expected to achieve 100 times faster performance than its predecessor , paving the way for a computing level that could exceed 1,000 petaflops (PFLOPS) . Currently, the “K” supercomputer—also known as “King” —is ranked fifth in the world’s top 500 most powerful systems . Its

Microsoft blocks access to cloud services for Israel’s Intelligence Unit 8200

The Israeli intelligence unit, the Israeli equivalent of the US National Security Agency (NSA), has been stripped of access to some Microsoft Azure cloud services by the Redmond-based company. Unit 8200 had previously been accused of spying on Palestinians in Israeli-controlled territories using Microsoft technology. Microsoft has blocked the Israeli Ministry of Defense from accessing some of its Azure cloud services after media reports emerged that they were being used for mass surveillance of West Bank and Gaza residents, The Register reports. Microsoft Chairman Brad Smith issued a public statement following the publication of an article in the British newspaper The Guardian,

Hackers hit the United States: critical federal infrastructure compromised

Hackers have breached Cisco networking equipment belonging to several US government agencies , Bloomberg reports. The cyber threat, which occurred on September 26, 2025, targeted US federal agencies, including Russian ministries. According to Chris Butera , acting deputy executive assistant to the director of cybersecurity at the U.S. Cybersecurity and Information Technology Infrastructure Agency (CISA) , the cyberattack affected a critical U.S. federal cyber infrastructure, but he did not specify which one. “The cyber threat is pervasive,” the official noted. On September 25, CISA issued a directive requiring civilian government employees to identify devices affected by the cyberattack, collect data, and assess

Shocking collapse: -71% of job offers for software engineers in three years

A new Google report highlights how artificial intelligence is now an integral part of the daily work of technology professionals. The study, conducted by its DORA (DevOps Research and Assessment) research division and based on 5,000 interviews with industry experts worldwide, reveals that 90% of respondents use AI tools. This represents a 14% increase compared to 2024. The survey comes at a time when the evolution of AI is fueling both excitement and fear, especially regarding its impact on employment. In May, Anthropic CEO Dario Amodei predicted a potential increase in unemployment linked to the technology’s spread, though other analysts have downplayed

Delivery of €13 million in submarine cables for the Shanhaiguan offshore project

At Haihui Port in Xiaoting, along the Yangtze River, a large red steel structure provided the backdrop for the delivery of a massive order of submarine cables from Yichang Qifan. Using a specialized system, the cables were transported from the workshop to the top of the structure and then neatly wrapped in a storage cage, in an operation worth hundreds of millions of yuan. According to Yu Jun, director of production, the company has already exceeded 500 million yuan in submarine cable shipments this year, with orders scheduled until the end of the year. Customers include strategic projects on the islands of

Microsoft gives in to EU pressure: Windows 10 will get free security updates.

Microsoft has agreed to address the demands of European human rights activists and extend Windows 10 support to users in the European Economic Area (EEA) without further conditions. Extended Security Updates (ESU) will now be available free of charge, although the formal end of support for the system is still scheduled for October 14, 2025. In October last year, the company announced that Windows 10 owners could receive a year of security updates after the system “died,” but only for a one-time fee of $30 (or the equivalent based on local rates). In June, a “free” alternative was introduced: protection could be

New wave of malicious emails associated with the Hive0117 group

F6 has reported a new wave of malicious emails associated with the Hive0117 group. Hive0117 has been active since February 2022 and uses the DarkWatchman RAT Trojan . The group disguises its campaigns as messages from legitimate organizations, records email infrastructure and control domains, and sometimes repurposes them . According to F6, DarkWatchman activity was detected on September 24, after several months of silence. The attacks were carried out under the guise of the Federal Bailiff Service from the address mail@fssp[.]buzz. Similar mailings were observed in June and July. Analysis revealed the domains 4ad74aab[.]cfd and 4ad74aab[.]xyz. The attacks targeted companies in Russia

An SVG file disguised as a PDF led victims to a fake login

Microsoft Threat Intelligence specialists have identified an attack in which attackers used artificial intelligence for the first time to disguise phishing code. The goal was to steal credentials from companies in the United States. The malicious SVG file hid its true functionality behind a layer of pseudo-corporate terminology and a simulated analytics dashboard , allowing it to bypass simple checks. Analysis revealed that the code’s structure was uncharacteristic of handwriting and was likely generated by a generative model. The emails came from a hacked corporate account , with the sender’s address matching the recipient’s, and the actual addresses BCCed. The attachment mimicked

Airports shut down, ransomware, four days of chaos, and a suspect arrested. An attack that shook Europe.

On September 19, a major cyber incident occurred in Europe, affecting Collins Aerospace, one of the world’s largest aerospace technology suppliers . The attack disrupted airline operations and affected flights at major European hubs. The impact was particularly noticeable at London Heathrow Airport, where passengers faced flight delays and cancellations throughout the weekend. According to law enforcement, the attack targeted Collins Aerospace systems that support and coordinate a series of technological processes related to aviation safety and flight operations. The disruption of these services rapidly impacted the supply chain and operational processes, causing disruptions to air transport in several EU countries. On