Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
LECS 320x100 1
2nd Edition GlitchZone RHC 970x120 2

Author: Redazione RHC

Discovering Wipers: The Silent Threat That Ruthlessly Destroys Data

Wider malware (in Italian “eliminator” or “deleter”) is a type of malicious software designed to destroy or “erase” data and files on the computer systems it infects. Unlike other types of malware such as viruses or Trojans, wipers do not seek to infect as many computers as possible or steal sensitive data; their primary goal is data destruction. Widers can act in various ways: for example, they can overwrite data on hard drives or storage devices, preventing access to the original files; they can delete system files or critical parts of the operating system, rendering the system unusable; They can completely erase

What are Remote Access Trojans (RATs): The menacing shadow behind spam emails

Remote Access Trojans (RATs), or Remote Access Trojans, are a category of malware. They are designed to allow attackers to remotely control an infected device. This malware is particularly dangerous because it gives attackers complete access to the compromised system. It allows them to perform a wide range of malicious activities without the user’s consent or knowledge. In this article, we’ll learn how this powerful malware is often used as a landing point for an infection. Next, we’ll understand how this tool is used to distribute further malware. What are Remote Access Trojans (RATs) RATs are a category of malware designed to

Elk Cloner. The first computer virus in history.

In the late 1990s, when the Internet was still very young, it was common for tech-savvy kids to scare their friends by controlling (or, in Internet parlance, “trolling”) their PCs remotely. They’d open the CD tray, swap mouse buttons, or change the desktop colors, and to the unsuspecting user, it would seem as if a ghost were taking control of the machine. Recall the story of Elk cloner (the virus with a “personality”), one of the first known microcomputer viruses to spread outside the computer system or the lab where it was written. It attacked the Apple II operating system and spread

SoftBank launches 4G and 5G base stations on stratospheric airships

SoftBank has announced that trials of 4G and 5G base stations installed on airships will begin in Japan in 2026. The airships will lift the equipment to an altitude of 20 km, into the stratosphere, where there are virtually no strong winds. Such a high-altitude platform will provide a direct connection to ordinary smartphones and promises latency half that of the Starlink satellite system. The operation of stratospheric platforms will be cheaper. Japan’s SoftBank is relying on the developments of the American startup Sceye of Moriarty, New Mexico. The cooperation agreement was signed in 2020. In October 2023, the joint team of

New GhostContainer backdoor discovered that threatens Asian companies’ Exchange instances

Kaspersky Lab specialists have discovered a new backdoor called GhostContainer, based on open-source tools. Researchers believe the appearance of this malware may be part of a sophisticated targeted campaign targeting large organizations in Asia, including high-tech companies. The attackers are presumably aiming for cyber espionage. The malware was discovered in response to an incident involving attacks on Exchange infrastructure in the public sector. The researchers focused on the App_Web_Container_1.dll file, which turned out to be a complex, multifunctional backdoor based on several open-source projects. The malware can dynamically expand and acquire new functionality by loading additional modules. Installing a backdoor gives attackers

It costs 5 iPhones, jumps, throws punches, but still doesn’t wash dishes. R1, the Chinese robot that’s taking the internet by storm.

In the increasingly crowded landscape of humanoid robots, the new Unitree R1 has made headlines not only for its acrobatic capabilities, but above all for its unconventional price: around $5,900 (about €5,500). A surprising price when you consider that previous models—like Unitree’s own G1—ranged up to nearly 99,000 yuan (over €12,000). But what can the R1 really do? And can we really imagine it as a home assistant? Technology and Features R1 is approximately 1.21 meters tall, weighs 25 kg, and has 26 degrees of freedom, allowing for complex and fluid movements: somersaults, punches, spinning kicks, even handstands. All thanks to a

Backdoor Alert! China Concerned About Possible Interference Through Nvidia Chips

The Cyberspace Administration of China (CAC) has expressed concern about the recent US proposal to integrate tracking and localization capabilities into advanced chips intended for export. This measure could jeopardize Nvidia‘s sales prospects in the Chinese market, just weeks after the US lifted the export ban on the company’s H20 chips. In a statement released Thursday, the CAC said it had summoned Nvidia to clarify whether the H20 chip contained potential security risks, specifically the presence of a “backdoor”: a hidden mechanism that can bypass normal authentication or security measures, opening the way for possible unauthorized access. Nvidia, for its part, has

Microsoft Edge launches Copilot mode, following Chrome’s lead.

After two years of small changes to the Edge browser’s AI features, Microsoft recently added Copilot mode to the Edge browser, officially entering the AI browser market. Specifically, the AI feature in the Edge browser is no longer just a chat sidebar as it was previously. The new Copilot mode allows AI to read and understand the content of web pages, for example, helping to interpret a technical documentation page or providing a viewing overview for a YouTube video. It can also navigate all your open web pages simultaneously, and when you’re having trouble switching between product or hotel pages, it can

Vibe Coding Goes Wild. AI Generates Vulnerable Code, But No One Cares

Artificial intelligence is increasingly becoming a programmers’ assistant, but a Veracode study has shown that convenience comes with a security risk. An analysis of 100 top language models (LLMs) revealed an alarming pattern: In nearly half of the cases, the models generate vulnerable code. According to a Veracode report, 45% of the code generated by the tasks contained known vulnerabilities. And this is true even for the newest and most powerful models. The situation hasn’t changed much in the last two years, despite technological progress. Tests were conducted on 80 tasks in four programming languages: Java, JavaScript, C#, and Python. The most

ChatGPT chats shared on Google! Privacy threat or SEO opportunity?

Google has started indexing ChatGPT conversations that users share using the “Share” button. The issue first came to light thanks to a Fast Company investigation, which revealed—through the use of Google Dorks—that approximately 4,500 ChatGPT conversations were appearing in Google search results. At first glance (as reported in a LinkedIn post by Jean Bonnenfant), for many this new development sounds like a privacy nightmare: their questions, thoughts, or even business ideas risk becoming public and appearing in search results. However, looking deeper, this move could transform the world of digital marketing, offering unprecedented opportunities for SEO and content marketing. Anyone who has