Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
TM RedHotCyber 320x100 042514
Banner Ancharia Desktop 1 1

Author: Redazione RHC

Musk reveals he may lose control of Tesla

Musk recently stated publicly that his control over the company is precarious and that he “could be ousted.” The controversy arose from Musk’s publicly expressed concerns about his stake. Musk reportedly recently responded on social media platform X, stating that his current stake of about 12.8% is not enough to ensure his dominant position in the company. He fears he could be “ousted” by activist shareholders in the future, when the company produces “millions of robots.” A recent post mentioned that Musk’s equity stake was 21.2% and suggested that most of the shares had been used as collateral for a loan. Musk

After 18 years of silence, Anne begins to speak again. The new BCI technology from the University of Berkeley

Eighteen years after a brainstem stroke left Anne Johnson almost completely paralyzed, she’s now using a brain-computer interface (BCI) that converts speech directly from brain signals. In 2005, at age 30, the Saskatchewan teacher and athletic trainer suffered a brain injury that left her with locked-in syndrome, in which she remains conscious but unable to speak or move. For years, she communicated through an eye-tracking system, speaking at a rate of about 14 words per minute, significantly slower than the 160 words a person normally speaks. In 2022, she became the third participant in a clinical trial conducted by the University of

Will drones on missions be able to autonomously decide which men to kill?

It appears that the United States has already seriously considered the concept of autonomous warfare. DARPA’s autonomous fighter jet, capable of unmanned combat, is no longer considered a breakthrough: the agency has moved to the next phase of development, aiming to create systems capable of controlling a group of fighter jets in joint beyond-visual-range missions. DARPA’s new program, Artificial Intelligence Reinforcements (AIR), builds on the Air Combat Evolution (ACE) project, which pitted AI-equipped F-16s against manned aircraft in a training “dogfight.” The goal is to increase autonomy to the point where these aircraft can operate in formation, coordinating over long distances and

After the laundry, Figure 02 now folds the laundry. But for now, you’ll have to continue doing it yourself.

Just two weeks ago, the humanoid robot produced by Figure amazed us when it deftly removed clothes from a laundry basket and placed them in a washing machine. This was all extremely surprising. A future in which humans are free from this tedious burden is showcased in a new video from Figure, where the same robot is seen arranging freshly laundered towels, then putting them aside folded. Using a new dataset specifically for laundry folding, Figure02 adopts the same Helix Vision Language Action (VLA) model already used by the company in its industrial logistics operations, with the aim of guiding the process

Did you respond to IT support on Teams? Congratulations! The Trojan is on your PC with rights that exceed yours.

The research team at Trustwave SpiderLabs has identified a new wave of EncryptHub attacks that combine human error and the exploitation of a vulnerability in the Microsoft Management Console. Operators pose as support staff, contact them via Microsoft Teams, and then convince the “customer” to open remote access and execute a series of commands, before deploying the payload for the CVE-2025-26633 bug, known as MSC EvilTwin. At the same time, the group uses non-standard distribution channels, including the Brave support platform, which complicates traffic filtering and incident analysis. Reports also list other names from the same team: LARVA-208 and Water Gamayun; Previously,

Google fixes critical bug in Gemini that allows tracking of users

Google developers have fixed a bug that allowed malicious Google Calendar invitations to remotely take control of Gemini agents running on the victim’s device and steal user data. Gemini is Google’s Large Language Model (LLM) integrated into Android apps. SafeBreach researchers discovered that by sending the victim an invitation with an embedded Google Calendar prompt (which could be hidden, for example, in the event title), attackers were able to extract email content and calendar information, track the user’s location, control smart home devices via Google Home, open Android apps, and initiate Zoom video calls. In their report, the experts emphasize that such

It only took one too many! Phishing scam impersonating Booking.com using homoglyphics.

Attackers have started using an unusual trick to disguise phishing links, making them appear as Booking.com addresses. The new malware campaign uses the Japanese hiragana character “ん” (U+3093). In some fonts and interfaces, it visually resembles a slash, making the URL appear to be a normal path on the site, although it actually leads to a fake domain. Researcher JAMESWT discovered that the link in phishing emails looks like this: https://admin.booking.com/hotel/hoteladmin/… But it actually directs the user to a type https://account.booking.comんdetailんrestrict-access.www-account-booking.com/en/. Everything before “www-account-booking[.]com” is just a subdomain that mimics the structure of the real site. The real registered domain belongs to

Cobalt Strike for everyone with CrossC2! We’re paying attention to Linux servers without EDR

Japan has been hit by a new wave of cyberattacks using CrossC2, a tool to extend the functionality of Cobalt Strike to Linux and macOS platforms. The JPCERT/CC Coordination Center reported that the attacks took place between September and December 2024 and affected several countries, including Japan. Analysis of artifacts uploaded to VirusTotal showed that the attackers combined CrossC2 with other tools such as PsExec, Plink, and Cobalt Strike itself to penetrate the Active Directory infrastructure. Cobalt Strike was loaded using specially developed malware called ReadNimeLoader. CrossC2 is an unofficial version of Beacon and its builder that allows the execution of Cobalt

Bug da Oscar (score 10) per Cisco Secure Firewall Management Center

A critical security flaw has been disclosed by Cisco in its Secure Firewall Management Center (FMC) software, potentially allowing unauthenticated attackers to remotely execute shell commands of their choice with high levels of authorization. The vulnerability, identified as CVE-2025-20265 and assigned the maximum CVSS score of 10.0, represents one of the most serious security flaws discovered in Cisco’s firewall infrastructure this year. Attackers can exploit this vulnerability by sending specially crafted credentials during the RADIUS authentication process, allowing them to inject malicious shell commands that are subsequently executed by the target device. What makes this vulnerability particularly dangerous is The fact that

The Robot Girlfriend is coming! The new frontier of Chinese-made technology.

While the rise of robots in China, the world’s largest market and producer of robots, is attracting the attention of the global information technology (IT) industry, the emergence of a “girlfriend robot” is causing a stir. This small robot, modeled after a young woman, can sing and dance like a girl group and even engage in emotional exchanges. It was recently sold for around 2 million won at an auction (about 2,000 euros). According to Chinese media such as Kwai Technology, Shanghai-based robotics company Lingdong Robotics recently launched its first robotic product, the humanoid robot “NIA-F01” (Chinese name: “Nian”), priced at 9,999