Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Redhotcyber Banner Sito 320x100px Uscita 101125
Banner Ancharia Desktop 1 1

Author: Redazione RHC

UNC6395 campaign aims to exfiltrate Salesforce data via compromised OAuth tokens

A sophisticated data exfiltration campaign targeting companies’ Salesforce instances was conducted, resulting in the exposure of sensitive information from several organizations. This occurred through compromised OAuth tokens associated with the third-party Salesloft Drift application. The threat actor, identified as UNC6395, collected credentials and sensitive data between August 8 and August 18, 2025. This demonstrated significant knowledge of operational security procedures, as SOQL queries were run against multiple Salesforce objects. UNC6395 ran systematic Salesforce Object Query Language (SOQL) queries to enumerate and extract data from critical Salesforce objects, including cases, accounts, users, and opportunities. The report comes from Google Threat Intelligence Group that

Supercomputer: Fugaku NEXT will be Japan’s first zetta-class supercomputer

RIKEN, Fujitsu, and Nvidia are collaborating on the development of FugakuNEXT, Japan’s new flagship supercomputer, scheduled to become operational at the RIKEN campus in Kobe around 2030. With an estimated budget of approximately 110 billion yen (approximately $740 million), FugakuNEXT is the successor to the current Fugaku, currently ranked seventh in the world’s supercomputer rankings. The goal is ambitious: to reach 600 exaFLOPS (EFLOPS) of precision. FP8, a milestone that would make it the world’s first zetta-class (10²¹) supercomputer. Compared to Fugaku, the new system will offer an overall performance improvement of more than 100x, thanks to: All this while maintaining energy

Intel Website Vulnerabilities: 270,000 Employees at Risk

An attack on Intel’s internal resources has demonstrated that vulnerabilities can be found not only in processors, but also in company websites. A security researcher discovered four different ways to obtain data on over 270,000 Intel employees: from human resources databases and contact information to supplier and manufacturing process information. All the identified vulnerabilities have already been fixed, but the very fact that they were discovered demonstrates how fragile the internal infrastructure of even the largest market players can be. The first issue was found in the service for ordering business cards for Intel India employees. The site was based on Angular

Father and son wanted by the FBI. $10 million reward for hackers who collaborated with the GRU.

The FBI is offering a generous reward for anyone who can help find Amin Stigal, 23, and Timur Stigal, 47, a father and son team. They are accused of hacking into the computer systems of government agencies in Ukraine and dozens of Western countries. Furthermore, their backgrounds include alleged “subversive actions” in collaboration with Russian GRU officers, trafficking in stolen credit card data, extortion, and more. The Stigall family apparently now lives in Saratov. Timur Stigall admitted in a conversation with journalists that he had participated in some operations against foreign intelligence services. However, he denies his son Amin’s guilt. It should

Trial underway for the four damaged internet cables in the Baltic Sea. The captain: “I am not accused of any wrongdoing.”

The trial has begun for the crew of the oil tanker Eagle S, which tore several undersea cables in the Gulf of Finland in 2024. The captain of the tanker and his two officers are accused of damaging five undersea power and telecommunications cables as the ship left Russia and passed through the Gulf of Finland. Both denied guilt during the trial that began Monday in Helsinki. The prosecution alleges that the crew of the tanker Eagle S deliberately dragged its anchor along the seabed to sever the Estlink 2 electricity transmission cable connecting Estonia and Finland, as well as four other

The US Army evolves: more power for cyber and electronic operations

The U.S. Army is increasingly investing in reintroducing electronic warfare capabilities among its troops, planning to equip division-level units with advanced cyber tools over the next two years. This development stems from the need to respond to tactical cyber warfare operations, given that the Cyber Mission Force focuses primarily on strategic targets accessible via the internet, leaving an operational void for what happens directly in the field. The new capabilities will allow maneuver commanders to use digital land-based tools to support their formations, integrating electronic and cyber operations into daily combat strategies. Most of these capabilities will be managed by the 11th

19 million installs of 77APP spread malware on Google Play

Zscaler researchers discovered that 77 malicious Android apps, with a combined total of over 19 million installs, were distributing various malware families in the official Google Play store. “We identified a sharp increase in the number of malicious advertising apps in the Google Play Store, along with threats such as Joker, Harly, and banking trojans such as Anatsa,” the experts write. “At the same time, there has been a notable decrease in activity from malware families such as Facestealer and Coper.” Researchers discovered the campaign while investigating a new wave of Anatsa banking Trojan infections (also known as Tea Bot) targeting Android

Happy birthday Windows 95: the system that changed PCs forever!

August 24, 2025, marked the 30th anniversary of the launch of Windows 95, Microsoft’s first mass-market 32-bit consumer operating system, which significantly revolutionized the world of personal computing. In the era of limited home Internet connectivity, the software was sold in boxes, and demand was record-breaking: one million copies were sold in the first four days, and approximately 40 million within a year. A modern operating system Windows 95 represented a turning point in corporate strategy. Following the success of Windows 3.0, Microsoft set out to unite the disparate worlds of MS-DOS and Windows into a single user experience. To reach the

RDP Under Fire! 30,000 Unique IP Addresses Probe Exposed Services for Targeted Attacks

Security researchers at greyNoise have detected a large, coordinated scanning operation against Microsoft Remote Desktop Protocol (RDP) services, in which attackers scanned over 30,000 unique IP addresses to assess vulnerabilities in the Microsoft RD Web Access and RDP Web Client authentication portals. The attack methodology focuses on time-based authentication enumeration, a technique that exploits subtle differences in server response times to identify valid usernames without triggering traditional brute-force detection mechanisms. This approach allows attackers to create comprehensive lists of targets for subsequent credential stuffing and password spraying, while maintaining maximum operational discretion. The campaign, reports researchers at GrayNoise, represents one of the

No Miracle! The Pontifical Salesian University falls victim to ransomware.

On the night of August 19, the IT infrastructure of the Salesian Pontifical University (UPS) was the victim of a serious cyber attack that rendered the University’s website and all digital services temporarily inaccessible. The incident resulted in an immediate shutdown of online activities, causing inconvenience to students, faculty, and administrative staff. We don’t know if it was ransomware, but the words “assess the damage and initiate recovery operations” in the press release suggest so. Following the attack, the National Cybersecurity Agency and the Postal Police promptly intervened to conduct the necessary investigations and adopt containment measures. The competent authorities are working