Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Banner Mobile
Enterprise BusinessLog 970x120 1

Author: Redazione RHC

There’s no antivirus to protect you! ModStealer affects Windows, macOS, and Linux.

Mosyle has discovered a new malware program called ModStealer. The program is completely undetectable by antivirus solutions and was first uploaded to VirusTotal almost a month ago without any security measures activated. The danger is compounded by the fact that the malicious tool can infect computers running macOS, Windows, and Linux. Distribution occurs via fake ads on behalf of recruiters looking for developers. The victim is asked to follow a link containing heavily obfuscated JavaScript code written in NodeJS. This approach makes the program invisible to signature-based solutions. ModStealer is designed to steal data, and its developers initially integrated functionality to extract

From the Vatican to Facebook with fury: the miracle of a divine scam!

In recent years, online scams have taken on increasingly sophisticated forms, exploiting not only social engineering techniques but also the trust that millions of people place in religious, institutional, or charismatic figures. A prime example is fake social media profiles that use the images of high-ranking prelates or even the Pope to attract the attention of the faithful. These seemingly harmless profiles often invite people to contact them on WhatsApp or other messaging platforms, providing international phone numbers. How the scam works Cybercriminals create a fake profile, like in this case for Pope Leo XIV. Obviously, the real photo of the Pontiff

Mustang Panda, New SnakeDisk Cyber Attack Targeting Thailand

IBM X-Force researchers have discovered new operations by the Chinese group Hive0154, better known as Mustang Panda. Experts have documented the simultaneous use of an advanced version of the Toneshell backdoor and a new USB worm called SnakeDisk, which specifically targets devices in Thailand. This approach demonstrates a targeted effort to penetrate even the region’s isolated government networks. The new version of the malware, dubbed Toneshell9, represents a significant improvement over previous versions, thanks to built-in mechanisms to operate through corporate proxy servers, allowing malicious traffic to masquerade as legitimate network connections. Toneshell9’s arsenal includes a dual reverse shell for parallel command

Goodbye, Windows 10! Microsoft warns that updates will end on October 14th.

Microsoft reminded users that support for the beloved Windows 10 will end in a month. Starting October 14, 2025, the system will no longer receive security updates, bug fixes, and technical support. This applies to all editions of Windows 10 version 22H2: Home, Pro, Enterprise, Education, and IoT Enterprise. The final patch package will be released in October; Subsequently, devices running this operating system will be left without monthly updates, dramatically increasing the risk of vulnerability exploitation. On the same day, extended support for Windows 10 2015 LTSB and Windows 10 IoT Enterprise LTSB 2015 will end. Users are offered several options.

BitLocker in the crosshairs: stealth attacks via COM hijacking. Online PoC

An innovative tool known as BitlockMove has been introduced, which highlights a novel lateral movement technique. This PoC leverages DCOM interfaces and COM hijacking, both of which are functional for BitLocker. Released by security researcher Fabian Mosch of r-tec Cyber Security, the tool allows attackers to execute code on remote systems within the session of an already logged-in user, avoiding the need to steal credentials or impersonate accounts. This technique is particularly subtle because the malicious code executes directly in the context of the target user, generating fewer indicators of compromise than traditional methods such as credential theft from LSASS. The PoC

The ChillyHell backdoor returns to threaten macOS systems.

Researchers have reported a new surge in activity for ChillyHell, a modular backdoor for macOS that was thought to be dormant for years, but which appears to have infected computers undetected for years. A sample of the malware was discovered in May 2025 on VirusTotal, although traces of its activity date back at least to 2021. ChillyHell is written in C++ and targets Intel architectures. It was first studied by members of the Mandiant team in 2023, when they linked the backdoor to the UNC4487 group. The team hacked a Ukrainian car insurance website used by government employees to book travel. Despite

Apple introduces Memory Integrity Enforcement. Will this be the end of hacking?

Apple officially introduced Memory Integrity Enforcement, a new memory protection system that the company calls the most significant advancement ever made in consumer operating system security. It took five years to develop and combine the hardware capabilities of Apple Silicon with the software capabilities of iOS and macOS. According to engineers, iPhone 17 and iPhone Air users now have the industry’s first always-on memory protection, which works without any significant impact on performance. The company emphasizes that, so far, no mass-market malware has managed to penetrate iOS defenses. The only recorded systemic attacks come from the arsenal of commercial spyware used by

Linux in Crisis: Rust Splits Community and Maintainers Leave

The Linux world and its surroundings are going through turbulent times. Developers are debating how to integrate Rust into the kernel while key contributors are leaving. Against the backdrop of these conflicts, talk of possible forks is starting again, but the reality is much more complex: a whole group of alternative operating systems is maturing alongside Linux, each following its own path and demonstrating different approaches to kernel architecture, security, and compatibility. Internal struggles and maintainer resignations Rust’s history has been painful for the kernel community. The ability to use the language in low-level components has opened up new perspectives, but has

Happy Birthday, Super Mario Bros.! 40 years of a game that revolutionized the world.

It’s been exactly four decades since the release of the legendary Super Mario Bros., a project that changed the video game industry forever and became the symbol of an entire era. Super Mario Bros.: The Creators and the Impact It was on September 13, 1985, that the Japanese company Nintendo released its masterpiece for the Famicom console. At the time, few could have imagined that the seemingly simple story of an Italian plumber saving a princess from an evil dragon-turtle would become a global cultural phenomenon. Super Mario Bros. arrived at a turning point for the video game industry. After the collapse

China Makes Historic Turn: Mandatory Labeling of AI-Created Content

A series of Chinese national standards came into force on September 1st, aimed at redefining rules, responsibilities, and controls in increasingly strategic technology and consumer sectors. The State Administration for Market Regulation has published provisions ranging from the identification of synthetic content generated by artificial intelligence to safety standards for electric bicycles and mobile bicycles, with the stated aim of protecting consumers, improving product quality, and supporting the transition to more energy-efficient technologies. Among the most relevant measures is the mandatory standard GB 45438-2025, which defines the methods for identifying synthetic content produced by AI. The text establishes technical procedures and application