Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Redhotcyber Banner Sito 320x100px Uscita 101125
Redhotcyber Banner Sito 970x120px Uscita 101125

Author: Redazione RHC

A manifesto after 72 hours! Will cybercriminals really retreat?

Fifteen of the most notorious cybercriminal groups, including Scattered Spider, ShinyHunters, and Lapsus$, have announced their closure. Their collective statement, published on BreachForums, is the most explicit message from the underground in recent years. The group emphasized that their goal was less extortion than to demonstrate the weaknesses of digital systems. Now, however, they have declared that they prefer “silence” to public attacks. The document, published under several pseudonyms of well-known hackers, claims that the decision was made after three days of silence, spent by the participants with their families and reviewing their plans in the event of persecution. They said they

Incitement to Suicide and OpenAI. New Security Measures Introduced for ChatGPT

OpenAI has announced new security measures for ChatGPT following a series of tragic stories and lawsuits accusing the chatbot of involvement in teen suicides. The system will now attempt to determine the age of the person chatting with and, if necessary, request ID to confirm the user is over 18. The company acknowledged that this limits the privacy of adults, but deemed the tradeoff justified for security reasons. OpenAI CEO Sam Altman said he did not expect unanimous approval for these measures, but considered them necessary amid growing conflict over artificial intelligence regulation. This decision was influenced by a series of high-profile

Next Cybersecurity: Fight AI with Artificial Intelligence

The Artificial Intelligence Security Governance Forum was held in Kunming, Yunnan Province, southwestern China, as part of the National Cybersecurity Publicity Week 2025. The event offered an opportunity to discuss the risks and challenges associated with AI, governance measures, and developments related to the security of applications and algorithms. Researchers, technicians, and representatives from various sectors shared experiences and practical results, highlighting how AI is revolutionizing numerous fields, including cybersecurity. At the security fair, technicians emphasized how large companies are now exposed to a wide range of cyber attacks. The threats range from more common, such as web application attacks, to more

Taiwan raises alert: Monitoring submarine cables for Chinese interference

In the Taiwan Strait, the local Coast Guard ha intensified patrolling activities To protect the undersea cables, infrastructure considered vital to the country’s communications. Commander Ruan Zhongqing led a 100-ton patrol boat, equipped with water cannons and machine guns, towards the “Taiwan-Pengzhou No. 3” cable to monitor any suspicious vessels. According to authorities, these links have become a new target of Chinese operations in the so-called “gray zone.” The Taiwan-Penghu 3 cable is one of 24 that connect the island to national and international networks. Attention to these infrastructures has increased after a Chinese captain was convicted in June for deliberately cutting

SlopAds: 38 million app installs sending 2.3 billion offers per day

A massive ad fraud scheme called SlopAds has been hiding behind hundreds of “harmless” Android apps and has reached global proportions. Recently, the Satori team at HUMAN described how 224 apps have amassed a total of 38 million installs across 228 countries and territories, generating up to 2.3 billion bids per day at peak times. Google removed all the detected apps from the Play Store, but the tactic itself deserves a separate analysis: it demonstrates how sophisticated click and impression fraud has become. The build relies on the simulated launch of malicious behavior. After installation, the app accesses the Mobile Marketing Attribution

Apple warns users of targeted spyware attacks

CERT-FR reported that Apple warned users late last week that their devices were being targeted by spyware attacks. Experts say they are aware of at least four cases of such notifications sent in 2025. The alerts were sent on March 5, April 29, June 25, and September 3 to phone numbers and email addresses associated with Apple user accounts. The alerts also appear at the top of the page on account.apple.com after a user logs in to their account. “These alerts report sophisticated attacks, most of which exploit zero-day vulnerabilities or require no user interaction,” writes CERT-FR. “These sophisticated attacks target individuals

Google changes Android strategy: no more monthly patches, only risk-based fixes.

Google has changed its Android security update strategy, breaking its tradition of disclosing vulnerabilities monthly for the first time in a decade. In its July 2025 bulletin, the company didn’t report a single vulnerability, the first time in 120 publications. But in September, the list included 119 fixes at once. The reason isn’t that July was “safe,” but that Google is moving to a new Risk-Based Update System (RBUS) model. Now, monthly updates will only contain fixes for “high-risk” vulnerabilities, meaning those actively exploited or part of known attack chains. The remaining vulnerabilities will be grouped into major quarterly releases: in March,

ShinyHunters violates Gucci, Balenciaga, and Alexander McQueen: $7.4 million worth of records exposed

Kering, the luxury and fashion giant, has officially announced that a data breach was perpetrated against customers of its leading brands, including Gucci, Balenciaga, and Alexander McQueen. ShinyHunters, the same threat actors we recently interviewed, managed to access users’ private information. The breach, detected in June but occurring in April, exposed personally identifiable information (PII) of approximately 7.4 million unique email addresses. No data regulated by the PCI-DSS standard, such as credit card numbers or bank account details, was exfiltrated. The files instead include names, email addresses, phone numbers, shipping addresses, and a “Total Sales” field indicating each customer’s cumulative spending. The

Perl returns to the top 10 most popular programming languages

TIOBE Software has released its September ranking of the most popular programming languages. The highlight of the publication was Perl’s return to the top 10, jumping from 27th to 10th place. Just a year ago, Perl was considered an “outsider,” but now its index is 2.03%. For comparison, it was 2.08% in August and 1.76% in July. This growth is particularly remarkable considering that during Perl’s “golden years” it rose to third place in the rankings (March 2005), only to decline for decades. According to TIOBE director Paul Jansen, the technical explanation for this increase lies in the large number of Perl

Hacker Scattered LAPSUS$ Hunters: Unauthorized Access to Google LERS

Google executives said that hackers created a fake account on the Law Enforcement Request System (LERS), the company’s platform used by law enforcement agencies to submit official data requests. Late last week, members of the hacker groups Scattered Spider, LAPSUS$, and Shiny Hunters (who claim to have merged and are now calling themselves Scattered LAPSUS$ Hunters) announced on Telegram that they had gained access to both the Google LERS portal and the FBI’s eCheck background check system. LERS and eCheck are used by law enforcement and intelligence agencies around the world to transmit subpoenas and orders, as well as urgent information disclosure