Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Crowdstrike 320×100
970x20 Itcentric

Author: Redazione RHC

Supercomputers: Italy ranks sixth and tenth in the 2025 TOP500 rankings.

The world of supercomputers has entered the era of exascale computing. The June 2025 TOP500 ranking recorded three American systems at the top, a sensational debut from Europe, and a notable presence of cloud and industrial installations in the top ten. High-performance computing now concerns not only national laboratories, but also commercial clouds and industrial centers. Supercomputer performance is measured in floating-point operations per second (FLOPS). In the TOP500 ranking, systems are ranked according to the LINPACK (HPL) test, where the key indicator Rmax reflects the sustainable speed in solving a large system of linear equations. Today, the leaders demonstrate a stable

Underwater warfare is upon us! Will Chinese cable cutters pose a global threat?

The new cable cutter, developed by the China Shipbuilding Research Center, is designed for use on advanced submarines such as the Fengdou and Haidou series. The device is capable of cutting armored steel and polymer communications cables, which play a critical role in maintaining or disrupting the global communications network, which accounts for 95% of the world’s data transmission. The Chinese deep-sea cable cutter can cut cables up to 2.4 inches thick at depths of nearly 4,000 meters. (Source: Sustainability Time) The device is equipped with a diamond-coated grinding wheel that rotates at 1,600 rpm, allowing it to tear steel cables without

$16 billion in stolen Apple, Meta, and Google credentials up for sale for $121,000

The Darklab team, Red Hot Cyber‘s community of threat intelligence experts, has identified an ad on the dark web marketplace “Tor Amazon”, the criminal counterpart of the popular e-commerce site on the clear web. The listing offers an unprecedented archive: 16 billion compromised credentials from leading platforms such as Apple, Facebook, Google, Binance, Coinbase, and many others. The listing, priced at 1 Bitcoin (about $121,000), represents one of the largest and most diverse collections of data ever to appear in the underground circuits. Origin and nature of the leak According to Darklab’s analysis, the packet does not originate from a single data

Android Colabrodo Edition: 120 vulnerabilities and two zero-days fixed

Google developers have released security updates for Android that address 120 operating system vulnerabilities. Two of these vulnerabilities, according to the company, have already been exploited by hackers in targeted attacks. The zero-day bugs fixed this month have been identified as CVE-2025-38352 (CVSS score 7.4) – a Privilege Escalation in the Linux kernel component and CVE-2025-48543 – a Privilege Escalation in the Android Runtime component. Google emphasizes that these vulnerabilities have already been exploited in limited, targeted attacks, but the company has not disclosed details about these incidents. The vulnerabilities are said to require no user interaction to be exploited. CVE-2025-38352 is

Chess.com Data Breach! Free Services for Affected Users

Chess.com, the online chess giant, has reportedly suffered a data breach that exposed the personal information of 4,541 individuals, according to a filing with the Maine Attorney General’s Office. The cyber incident occurred on June 5, 2025, and was discovered nearly two weeks later, on June 19, 2025. Chess.com confirmed that the breach was the result of an external cyber attack, in which attackers gained unauthorized access to sensitive data. The company reported that the hackers managed to obtain names and personal information, but did not provide a full breakdown of all the data elements exposed. The breach affected users in several

From Commodore 64 to GitHub! Gates and Allen’s BASIC goes open source after 48 years.

Microsoft has officially released the source code for its first version of BASIC for the MOS 6502 processor. For decades, it existed only in the form of leaks, museum copies, and unofficial builds. Now, for the first time, it is published under a free license and available for study and modification. The first version of Microsoft BASIC appeared in 1975 for the Altair 8800 microcomputer based on the Intel 8080 processor. It was written by the company’s founders, Bill Gates and Paul Allen. A year later, Gates, along with his second Microsoft employee, Rick Weiland, ported BASIC to the MOS 6502 processor.

New Wave of Quishing Attacks: Innovative Tactics from Cybercriminals

In recent years, a particularly insidious form of phishing has become widespread: Quishing or QRishing, a strategy based on the use of QR codes containing malicious links that, once scanned, redirect victims to fake websites specifically created to steal their credentials or sensitive information. Experts at Barracuda Networks, a leading cybersecurity solutions provider offering comprehensive protection from complex threats for businesses of all sizes, have discovered two innovative techniques used by cybercriminals to allow malicious QR codes to bypass security systems in phishing attacks. These tactics, described in detail in a new report, They involve splitting a QR code into two parts

NotDoor Arrives: APT28’s Microsoft Outlook Backdoor

An advanced backdoor system associated with the notorious Russian cyberespionage group APT28 allows attackers to download data, upload files, and issue commands to infected PCs. This recently discovered, next-generation backdoor system focuses on Microsoft Outlook, allowing attackers to steal information and control the affected person’s computer. The backdoor is designed to monitor the victim’s incoming emails for specific keywords, such as “Daily Report.” When an email containing the keyword is detected, the malware activates, allowing attackers to execute malicious commands. The name “NotDoor” was coined by researchers due to the use of the word “Nothing” in the malware’s code. The malware cleverly

Trump meets with all the AI tech leaders at the White House. Elon Musk is notably absent!

Today, Thursday, September 4, 2025, US President Donald Trump will host over two dozen technology and business leaders for a dinner in the newly renovated White House Rose Garden. An administration official confirmed the event, confirming the presence of prominent figures such as Mark Zuckerberg of Meta, Tim Cook of Apple, Bill Gates of Microsoft, and Sam Altman of OpenAI. The meeting represents a significant moment in the relationship between Trump and Silicon Valley, which has previously been marked by clashes over issues such as content moderation and antitrust regulations. Following Trump’s 2024 election victory, the tech sector has begun a process

Red Hot Cyber Conference 2026: Sponsorships Open for the Fifth Edition in Rome

The Red Hot Cyber Conference has become a regular event for the Red Hot Cyber community and for anyone working in or interested in the world of digital technologies and cybersecurity. The fifth edition will be held in Rome on Monday, May 18th and Tuesday, May 19th, 2026, at the historic Teatro Italia, and will feature two days packed with content, hands-on activities, and networking. Monday the 18th will be dedicated to hands-on” workshops (which will be held with our long-time sponsor Accenture Italia, which has supported us for the last three editions) and the Capture the Flag competition, while Tuesday the