Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
320×100
UtiliaCS 970x120

Author: Redazione RHC

Artificial intelligence will overwhelm us! The warning from a former Google executive is a dystopian future.

A former Google executive is sounding the alarm: artificial intelligence is poised to displace workers and drag us toward a dystopia. Mo Gawdat, a former Google executive, is sounding the alarm: artificial intelligence will not only impact entry-level jobs. It threatens all levels of intellectual labor, from developers to CEOs. He predicts a near future characterized by profound social and economic upheaval, driven by massive automation. Mo Gawdat doesn’t just highlight the risks of AI for technical or repetitive jobs. In an interview on the podcast Diary of a CEO, he argues that even the most skilled professions, often considered safe, will

Grok in “hot” mode! Create adult videos with Elon Musk’s AI

Elon Musk’s AI company, xAI, recently introduced a provocative feature to its Grok Imagine tool: “Spicy Mode.” This addition allows users to generate NSFW images and videos, marking a clear departure from the more restrictive content policies of other AI platforms. Grok Imagine is an AI-powered tool designed to convert text prompts into images and short videos. The introduction of “Spicy Mode” enables the creation of adult content, including partial nudity. While there is some moderation (some explicit prompts result in blurred or blocked images), users have reported the possibility of generating semi-nude images. The launch of “Spicy Mode” has sparked a

Google Hacked by ShinyHunters Cybergang. Customer Database Information Stolen

No IT giant can consider itself safe from cybercrime threats. We’ve seen these types of problems at Red Hot Cyber. For example, major companies like Microsoft and Apple have been targeted, most recently Google, which is leading the response to the ransomware threat. A recent breach of one of Google’s databases led to the theft of customer data, the company confirmed. In a blog post published Tuesday evening, Google Threat Intelligence Group said that a Salesforce database, used to store contact information and related notes for small and medium-sized businesses, was compromised. medium-sized businesses, was breached by a hacker group known as

GitHub CEO: Programmers Who Don’t Embrace AI Will Be Done

The common message from software development giants is this: Programming is transforming from manual labor to managing digital agents. GitHub CEO Thomas Domke has issued a stern warning to the global tech industry: developers who don’t embrace artificial intelligence should be ready to abandon the profession. His statement, published on the company blog under the title “Developers Reinvented”, reflects not only a technological transformation, but a radical reevaluation of the role of programmers themselves. The blog is based on interviews with 22 developers who have already deeply integrated artificial intelligence into their workflows. Their experiences demonstrate that artificial intelligence is not an

GPT-OSS is released: OpenAI’s new open-source model that works without an internet connection

This week, OpenAI unveiled a long-awaited open language model called gpt-oss. Its key selling point is the ability to run locally on your computer, including Macs with Apple Silicon processors. Here’s how it works and what to expect. This was likely a planned move after the release of DeepSeek R1, which created a lot of buzz in the AI world, something OpenAI couldn’t ignore. The model is available in two versions: gpt-oss-20b and gpt-oss-120b. The first version is a “medium” model that can run on high-end Macs with sufficient resources. The second is a “heavyweight” model that requires much more powerful hardware.

New Critical Vulnerability Discovered in Microsoft Exchange Server: CISA Warns

A critical security flaw has been discovered in hybrid deployments of Microsoft Exchange Server. This vulnerability (CWE-287) allows attackers with local administrative access to escalate their privileges within cloud environments. Although the complexity of the attack is considered high, attackers must first have administrative access to an Exchange server. However, once this prerequisite is met, the vulnerability classification indicates that exploitation can affect resources other than those of the initially compromised component This is CVE-2025-53786, which was officially documented by Microsoft on August 6, 2025, following a researcher’s demonstration at the Black Hat cybersecurity conference. Security researcher Dirk-Jan Mollema of Outsider Security

Artificial Intelligence Doesn’t Reduce Costs, It Increases Them! From Silicon Valley, the New Reality

The wave of layoffs in Silicon Valley continues in 2025. Silicon Valley CEOs are shouting that artificial intelligence will bring a new revolution in efficiency and will also be the light of the future for reshaping productivity. However, when this technological dividend falls on the heads of ordinary workers, there is often only one seemingly valid reason for the layoffs. The cost savings achieved through the use of artificial intelligence appear to have become an important element in corporate financial reporting, but for it to really work and be used stably, more and more companies must increase investments in subsequent maintenance, content

Two Android Vulnerabilities Actively Exploited: Google Releases Critical Patches

Google has released the August security updates for Android, which contain patches for six vulnerabilities. Two of these are related to Qualcomm components and have already been exploited in targeted attacks. The vulnerabilities under attack have been identified with the identifiers CVE-2025-21479 and CVE-2025-27038, and the Android security team became aware of them as early as January 2025. The first issue (CVE-2025-21479) is related to incorrect authorization in the graphics framework, which can cause Memory corruption due to the execution of unauthorized commands in the GPU micromodule based on a certain command sequence. The second issue (CVE-2025-27038) is a use-after-free bug that

Adobe Experience Manager Forms under attack! Urgent patch for a score 10 RCE zero-day bug.

On August 5, 2025, Adobe released an urgent security update for Adobe Experience Manager (AEM) Forms on Java Enterprise Edition (JEE), addressing two serious vulnerabilities: CVE-2025-54253 and CVE-2025-54254. The most serious, CVE-2025-54253, is a zero-day that was actively exploited in the wild before the patch, with a CVSS score of 10.0, the highest possible. An unauthenticated attacker can exploit this flaw to gain full control of the vulnerable server, executing remote commands, accessing sensitive data, and moving laterally across the network. The vulnerability is caused by a misconfiguration in some AEM Forms installations, where Apache Struts development mode is enabled by default.

A Year of Silence! Plague Discovered, the Linux Malware No One Had Seen

Researchers at Nextron Systems have discovered a new Linux malware that went undetected for over a year. It allows attackers to gain persistent SSH access and bypass authentication on compromised systems. The malware is called Plague and is a malicious PAM (Pluggable Authentication Module). It uses multi-layered obfuscation and masking techniques to evade detection by security solutions. Plague is able to resist debugging and analysis, hides its strings and commands, uses hardcoded passwords for stealth access, and can even hide session traces that could reveal attacker activity. Once loaded, the malware cleans the environment of its activity: it resets SSH-related environmental variables