Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Crowdstrike 320×100
Enterprise BusinessLog 970x120 1

Author: Redazione RHC

Linux surpasses 3% on Steam: one small step for gamers, one leap for the penguin.

Windows 10 lost 3.94% of its users, while Windows 11 gained only 3.18%, and some users chose to abandon the Microsoft ecosystem and move to other platforms. Linux led this migration, growing 0.41% to a total share of 3.05%. macOS also benefited, increasing 0.34% to 2.11%. Despite these numbers, Windows remains the clear leader, accounting for 94.84% of Steam gamers, with 63.57% on Windows 11, 31.14% on Windows 10, and a residual 0.09% on Windows 7. However, the trend suggests that alternatives are slowly eroding ground, a sign of users’ greater openness to other ecosystems. Within the Linux world, the most popular

Android malware to surge in 2025: 67% more attacks than last year

Analysts at cybersecurity firm Zscaler calculated that between June 2024 and May 2025 , 239 malicious apps were discovered on Google Play, which in total were downloaded more than 42 million times. According to the researchers’ report, the number of attacks on mobile devices increased by 67% over the past year. The main threats were banking Trojans, spyware, and adware. The main driver of this significant growth is attacks on mobile payments. Criminal hackers are abandoning traditional credit card counterfeiting methods and focusing on social engineering : phishing, smishing, SIM swapping, and other forms of payment fraud. While last year Zscaler counted

The most used password in 2025? It’s still “123456”! Humanity never learns.

In 2025, users still rely heavily on basic passwords to protect their accounts. A Comparitech study, based on an analysis of over 2 billion real passwords leaked to data breach forums over the course of a year, found that the most common passwords have remained unchanged for many years: ” 123456 ,” ” admin ,” and ” password ” remain the top choices. The company’s analysts have compiled a list of the 100 most common passwords. The top ten is dominated by familiar numerical sequences: ” 123456 “, ” 12345678 “, ” 123456789 “, followed by “admin”, “1234”, “Aa123456”, “12345”, “password”, “123”,

China will overtake the US in the AI race! Nvidia CEO warns, “We’re stuck in cynicism.”

Nvidia CEO Jensen Huang has warned that China will defeat the United States in the artificial intelligence (AI) race. The FT reported that Huang, at the Future of AI Summit hosted by the Financial Times (FT) that day, said: ” Western countries, including the US and the UK, are stuck in cynicism. We need more optimism .” Citing new AI regulations being developed in the US, Huang warned: ” There could be 50 new regulations (in all 50 states) .” He argued that this regulatory environment is undermining Western competitiveness . His comments came after the Donald Trump administration maintained restrictions on

Tesla wants to give Musk 1,000 billion dollars for a science fiction plan. More than the GDP of Switzerland!

Numerous accolades are pouring in for Elon Musk, who continues to deftly lead his empire’s multiple businesses, including Tesla, SpaceX, xAI, and Starlink , maintaining his firm hold on the top spot. Tesla’s fans are celebrating a strategy they believe pushes the boundaries of the auto industry. Behind this acclaim lies a momentous success: an unprecedented compensation plan for Musk, should Tesla achieve its goals. The situation is far-reaching, the context is enormous, and the implications are far broader than just electric cars. Musk and Tesla’s trajectory turns into a profit saga as soon as this new plan is introduced . Tesla’s

Russian Sandworm hackers target Ukrainian grain industry with wiper malware

Russian Sandworm hackers use wiper malware against the Ukrainian grain industry. Ukraine’s grain industry has become the latest target of the infamous, state-backed Russian hacking unit Sandworm, as part of Moscow’s ongoing efforts to undermine the country’s war-torn economy. According to new research from Slovakian cybersecurity firm ESET , between June and September, the Kremlin-linked group used various types of malware to wipe data from Ukrainian organizations in the grain, energy, logistics, and government sectors. Although wiper attacks have frequently targeted Ukrainian infrastructure since the Russian invasion, the agricultural industry, a key source of the country’s export revenue, has rarely been directly

Highly advanced, adaptive malware uses AI to confuse security defenses

Based on a recent analysis by the Google Threat Intelligence Group (GTIG), a shift has been identified among threat actors over the past year. Continuous improvements in the underground for AI abuse Attackers are no longer just leveraging artificial intelligence (AI) to increase attack productivity, but are deploying new AI-based malware into live operations . This marks a new operational phase of AI abuse, involving tools that dynamically alter behavior during execution. The report from Google’s threat intelligence team, an update to the January 2025 analysis, “Adversarial Misuse of Generative AI ,” details how cyber threat actors and government-backed cybercriminals are integrating

An AI extension for VS Code turns your PC into a digital hostage

Secure Annex researchers found a malicious extension in the Visual Studio Code Marketplace extension catalog for VS Code that features basic ransomware functionality. The malware was apparently written using Vibe coding, and its malicious functionality is clearly stated in the description. The extension was reportedly published under the name susvsex by an author nicknamed suspublisher18 . The description and README file clearly describe two key functions of the extension: uploading files to a remote server and encrypting all files on the victim’s computer using AES-256-CBC. Analysts report that the malware is clearly AI-generated and does not appear to have been carefully crafted.

The Louvre’s security myth crumbles! Between audits, ridiculous passwords, and outdated cameras.

The recent theft at the Louvre Museum, located in the heart of Paris, has shocked not only the art world but also the cybersecurity world. On the night of October 22, 2025, several French crown jewels were stolen from the Apollo Gallery, despite sophisticated alarm and surveillance systems. Investigators are still trying to understand how one of the most secure facilities in the world was breached , but security audits revealed something as trivial as it is worrying: weak passwords and outdated systems. Two independent audits had already highlighted critical issues related to the management of access credentials by museum staff. Many

Double-dealing: employees of a company that resolved ransomware attacks were launching them themselves

Three former DigitalMint employees, who investigated ransomware incidents and negotiated with ransomware groups, are accused of hacking into the networks of five American companies. According to the U.S. Department of Justice, they participated in BlackCat (ALPHV) ransomware attacks and extorted millions of dollars from victims. The case involves a 28-year-old and a 33-year-old Georgia man and their accomplice. They are charged with conspiracy to interfere with interstate commerce by racketeering, actual interference with commerce, and intentional damage to protected computers. These charges carry a maximum sentence of 50 years in prison. According to the Chicago Sun-Times , one of the two and