Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Fortinet 320x100px
Banner Ransomfeed 970x120 1

Author: Redazione RHC

An e-cigarette becomes a web server. And let hacking be!

Richard Stallman said many years ago “Playfully doing something difficult, whether it’s useful or not, that’s hacking!” Romanian engineer and origami master Bogdan Ionescu, known by the nickname BogdanTheGeek, has demonstrated that disposable e-cigarettes can be used for purposes other than those for which they were designed. He then transformed a discarded device into a functioning web server. Ionescu had long collected used e-cigarettes to make batteries for use in other projects. But with the advent of more “advanced” models, he turned his attention to integrated microcontrollers. In one of these devices, he found a chip labeled PUYA C642F15. After studying it,

Critical Linux Vulnerability: 0-Click N-Days Exploit Allows Remote Code Execution

A security researcher recently developed a zero-click exploit for the Linux SMB3 kernel daemon (ksmbd), exploiting two specific vulnerabilities. This exploit allows remote code execution (RCE) in kernel mode without any user interaction, posing a significant threat to vulnerable systems. The first bug, identified as CVE-2023-52440, involves a SLUB overflow in the ksmbd_decode_ntlmssp_auth_blob() method. This error occurs during NTLM authentication, when the session key length (sess_key_len) is controlled by the user. Setting this length too high can overwrite adjacent memory, allowing arbitrary code execution. The exploit was tested on Linux version 6.1.45, with all standard mitigations enabled, such as SMAP, SMEP, KPTI,

Security alert for AI servers: thousands are at risk

Artificial intelligence systems are increasingly under attack. This data emerges from “Trend Micro State of AI Security Report, 1H 2025“. The company urges IT professionals and community leaders to follow best practices for implementing secure AI application stacks to prevent data theft, model poisoning, extortion requests, and other attacks. “Artificial intelligence may be the opportunity of the century for businesses worldwide, but organizations that don’t take adequate precautions could end up experiencing more harm than good. As our latest research reveals, too many AI infrastructures are being built with unprotected or unpatched components, giving cybercriminals a free rein.” States Salvatore Marcis, Country

DeliveryRAT Trojan Alert: Hackers Steal Data and Money with Fake Apps

F6 and RuStore experts report having discovered and blocked 604 domains that were part of the infrastructure of hackers who infected mobile devices with the DeliveryRAT Trojan. The malware masqueraded as food delivery apps, marketplaces, banking services, and package tracking services. In the summer of 2024, F6 analysts discovered a new Android Trojan, called DeliveryRAT. Its main task was to collect confidential data for loan processing in microfinance organizations, as well as steal money through online banking. Subsequently, the Bonvi team’s Telegram bot was discovered, in which DeliveryRAT was distributed using the MaaS (Malware-as-a-Service) scheme. It turned out that, via the bot,

Vibe coding, yes, but be careful. Speed doesn’t always beat quality.

There’s a new phenomenon in the programming industry: vibe coding. Developers are increasingly using artificial intelligence agents to speed up their work, but they’re also encountering unpredictable problems. The stories of programmers who shared their experiences demonstrate that automated coding can make things easier or turn into a disaster. Carla Rover, who has worked in web development for over 15 years and is now founding a startup with her son to build machine learning models for marketplaces, admits she was moved to tears when she had to start the entire project over again. She trusted the AI-generated code and skipped a detailed

The Great Firewall in the Spotlight: The Leak Revealing the Industrialization of Chinese Censorship

Edited by Luca Stivali and Olivia Terragni. On September 11, 2025, what can be defined as the largest leak ever suffered by the Great Firewall of China (GFW) exploded in the media, massively and massively, revealing without filters the technological infrastructure that fuels censorship and digital surveillance in China. Over 600 gigabytes of internal material have been put online – via the Enlace Hacktivista group platform: code repositories, operational logs, technical documentation and correspondence between development teams. Material that offers a rare window into the inner workings of the world’s most sophisticated network control system. Researchers  Journalists worked on these files for

Jaguar Land Rover cyberattack leaves $50 million in losses

The cyber attack on Jaguar Land Rover, which paralyzed the company’s operations, has become one of the most serious crises for the British car manufacturer. The company was forced to disable IT systems and halt production at its Solihull, Halewood, and Wolverhampton plants. The assembly lines have been idle for almost two weeks and will not resume operation until midweek. The losses are estimated at tens of millions of pounds, and the consequences have affected not only the company but also its extensive supplier network. According to experts, the daily damage to JLR is between $6.8 million and $13.6 million, and total

Microsoft accused by Ron Wyden of cybersecurity negligence

US Senator Ron Wyden sent a letter on September 10 to the Federal Trade Commission (FTC) requesting an investigation into Microsoft, accusing the company of “gross negligence” in the field of cybersecurity. The reason was the use of an obsolete and insecure RC4 encryption algorithm in Windows, which is still the default algorithm for Active Directory. According to the senator’s office investigation, it was this feature that played a key role in a large-scale attack on the medical company Ascension in 2024, which resulted in the compromise of 5.6 million patient data. Wyden emphasized that, through “dangerous engineering,” an attacker could use

CrowdStrike and Meta launch CyberSOCEval to evaluate AI in cybersecurity

CrowdStrike today introduced, in collaboration with Meta, a new benchmark suite – CyberSOCEval – to evaluate the performance of artificial intelligence systems. in real security operations. Based on Meta’s CyberSecEval framework and CrowdStrike’s leading expertise in threat intelligence and AI data for cybersecurity, this open-source benchmark suite helps establish a new framework for testing, selecting, and leveraging large language models (LLM) in the Security Operations Center (SOC). Cyber defenders face a huge challengedue to the influx of security alerts and ever-evolving threats. To outperform adversaries, organizations must adopt the latest artificial intelligence technologies. Many security teams are still in the early stages

EvilAI: Malware that uses artificial intelligence to bypass security

A new EvilAI malware campaign tracked by Trend Micro has demonstrated how artificial intelligence is increasingly becoming a tool for cybercriminals. In recent weeks, dozens of infections have been reported worldwide, with the malware masquerading as legitimate AI-powered apps and displaying professional-looking interfaces, functional features, and even valid digital signatures. This approach allows it to bypass the security of both corporate systems and home devices. Country Count India 74 United States 68 France 58 Italy 31 Brazil 26 Germany 23 United Kingdom 14 Norway 10 Spain 10 Canada 8 analysts began monitoring the threat on August 29 and within a week had