Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Banner Ancharia Mobile 1
LECS 970x120 1

Author: Redazione RHC

The largest pirate sports streaming network has been shut down.

Egyptian authorities and the Alliance for Creativity and Entertainment (ACE) say they have shut down Streameast, the largest illegal sports streaming network in the world, and arrested two of the platform’s alleged operators. Streameast, active since 2018, is a free, ad-supported streaming service that offers access to HD content from licensed broadcasters. According to ACE, Streameast operates 80 domains that collectively generate 136 million monthly visits. The platform attracted 1.6 billion visits last year, primarily from the United States, Canada, the United Kingdom, the Philippines, and Germany. The pirate platform offers illegal streams of soccer leagues including the English Premier League, Spanish

Criticism of XChat: The new encrypted messaging service is no good

The social network X, formerly known as Twitter, has begun rolling out a new encrypted messaging service called XChat. It formally presents itself as a completely end-to-end encrypted platform: correspondence can only be read by its participants, and the service itself would not have access to the content. However, cryptographers are already pointing out that the current implementation is far from reliable and falls short of recognized standards like Signal. The first concern is how XChat handles keys. Upon activation, the user is asked to create a four-digit PIN, which is used to encrypt the private key. This key is then stored

CrowdStrike Threat Hunting Report 2025: Cybercriminals Use AI for Large-Scale Attacks

Over 320 companies have been breached by groups linked to North Korea (DPRK) with generative AI-powered attacks. Threat actors are leveraging AI agents, making autonomous systems the new attack perimeter for the enterprise environment. CrowdStrike has published the Threat Hunting Report 2025, which reveals a new phase in modern cyberattacks: adversaries are leveraging GenAI to scale operations and accelerate attacks – increasingly targeting the autonomous AI agents that are transforming businesses. The report reveals how threat actors are targeting the tools used to develop AI agents—gaining access, stealing credentials, and spreading malware—a clear sign that autonomous systems and system-generated identities have become

Apple launches Security Research Device 2026 program for security researchers

Apple has announced that it will accept applications for the Security Research Device Program (SRDP) 2026. Bug hunters interested in receiving an iPhone configured specifically for security research have until October 31, 2025, to apply. Since 2020, Apple has been providing special researchers with “jailbreakable” iPhones. Under the SRDP program, researchers receive a device that allows them to analyze iOS security without having to bypass the security features active on a regular phone. Program participants receive shell access to run any tool, as well as early access to security software and products, as well as special tools to help them with their

Salesloft Drift Incident Expands: Tenable Confirms Customer Data Breach

Tenable also suffered a compromise of contact information and support case details for some customers. The company said the incident was related to a large-scale data theft operation, which aimed to exploit the connection between the Salesloft Drift marketing application and Salesforce, impacting several organizations. Tenable expressed its commitment to transparency and detailed the extent of the breach. The company’s investigation found that an unauthorized user had gained access to some of the customer information stored in its Salesforce instance. He noted that there is currently no evidence to suggest that the attackers misused this information. Immediately after the incident was discovered,

9.9 out of 10! All SAP S/4HANA systems at risk: Patch now!

A critical vulnerability, CVE-2025-42957, has been identified in SAP S/4HANA, which has received a CVSS score of 9.9. The flaw allows a minimally privileged user to perform code injection and effectively take control of the entire system. It was discovered by the SecurityBridge Threat Research Labs team, which also confirmed its exploitation in real-world attacks. The vulnerability affects all versions of S/4HANA, including Private Cloud and On-Premise. To successfully exploit it, an attacker only needs a low-privileged account, then gains the privileges to execute operating system-level commands, create SAP superusers with SAP_ALL privileges, modify database data and business processes, and steal password

AI needs a shrink! It can be fooled like humans.

Entrepreneur Dan Shapiro ran into an unexpected problem: a popular AI-powered chatbot refused to decrypt company documents, citing copyright infringement. But instead of giving up, Shapiro decided to try an old psychological trick. He remembered Robert Cialdini’s book, “Influence: The Psychology of Persuasion,” which describes effective manipulation techniques for both salespeople and customers: likeability, authority, scarcity, reciprocity, social proof, engagement, and unity. After applying these strategies to his correspondence, Shapiro noticed that the model was starting to break down. Thus began a scientific study that led to a surprising conclusion: neural networks respond to the same behavioral signals as people. Together with

Telegram as a Command & Control Platform for Criminal Activities and the Role of Threat Intelligence

In today’s cybersecurity landscape, one of the most worrying trends is the abuse of legitimate messaging platforms for malicious purposes. Telegram in particular is increasingly being exploited by criminal groups as a Command & Control (C2) infrastructure, a centralized system for managing cyber attacks, receiving stolen data, and coordinating illicit operations. This phenomenon poses a significant challenge for companies, as the use of legitimate services makes it more difficult to detect and block such activities. Attackers exploit Telegram’s public APIs to create automated bots capable of receiving commands and transmitting stolen data. The typical process involves an initial compromise phase, often through

Houthi threat or mysterious incident? The Red Sea paralyzes Asia and the Middle East.

As we reported this morning, several undersea cables in the Red Sea have been severed, causing internet access delays and service disruptions in Asia and the Middle East. Microsoft said that its Azure cloud service has been significantly impacted, with slowdowns in data transmission between Asia and Europe via the Middle East. As we know, the Red Sea is a crucial hub for global communications, connecting Europe, Africa, and Asia, and hosts strategic undersea cables such as SEA-ME-WE-3 and AAE-1. These cables handle 99% of international data transmission, and their damage directly impacts digital communications between three continents. Submarine Cable Blocking NetBlocks,

Fired by the AI She Helped Create: The Shocking Story of Katherine Sullivan

In Australia, a 65-year-old bank employee was fired after the introduction of artificial intelligence, despite having contributed to its development. The story was reported by The Sun and concerns Katherine Sullivan, who lost her job in July after 25 years of service. Sullivan worked in the customer service department and had participated in testing the artificial intelligence system called Bumblebee. Following the launch of this technology, the bank decided to reduce staff, citing the transition to new digital tools. According to the bank’s press office, the aim of introducing artificial intelligence is to improve efficiency. However, after launch, Bumblebee failed to properly