Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
UtiliaCS 320x100
Fortinet 970x120px

Category: Cybercrime and Darknet

Twitter Hack: $4.1 Million Seized from 26-Year-Old Joseph James O’Connor

The story of the global Twitter hack in the summer of 2020 has had a sequel: British prosecutors have obtained the seizure of cryptocurrency mined by a key participant in the attack. The court ordered 26-year-old Joseph James O’Connor to return assets worth £4.1 million (approximately $5.4 million). This means the state has gained access to 42 bitcoins and related digital assets discovered during the multi-year investigation. The chain of events began with an unusually brazen attack , in which a criminal managed to gain control of the accounts of world leaders and entrepreneurs to defraud cryptocurrency users and intimidate celebrities. The

Shakerati Anonimi: Nicoletta’s experience and the credit card thriller

The room is the same: dim lights, chairs in a circle, thermoses of herbal teas now cold from all the talking and venting. We are Shakerati Anonimi , a group of people who never imagined we’d end up here, united by one thing: having been shaken, tricked, robbed by those who, behind the keyboard, have nothing to lose. After Pasquale, Simone, and Gianni, a woman takes a breath, adjusts her scarf, and stands up. It’s his turn. “Hi… I’m Nicoletta” “Hi everyone, my name is Nicoletta,” she says with a tight half-smile. “I’m 42 years old, I work as an administrative clerk

Apple ordered to pay $634 million to Masimo for patent infringement

Masimo, an American company that develops medical monitoring technologies, has won another round of litigation with Apple . A federal jury awarded it $634 million for infringing a patent on blood oxygen-sensing technology. According to Reuters, a jury found that the Apple Watch’s workout mode and heart rate notifications infringed on Masimo’s patented technology. The court estimated that the pulse oximetry features were implemented in approximately 43 million devices. The jury rejected Apple’s request to limit damages to between $3 million and $6 million. Masimo sought damages between $634 million and $749 million , and the court ultimately awarded the lower of

Microsoft Azure blocks a 15.72 terabit per second DDoS attack

A massive DDoS attack was neutralized by Microsoft Azure on October 24. A single endpoint located in Australia was targeted by the attack, which reached a maximum speed of 15.72 terabits per second (Tbps) and involved handling nearly 3.64 billion packets per second. Azure’s automated DDoS defense system quickly responded, ensuring zero downtime for affected customer workloads thanks to its ability to filter malicious traffic. The attack, which lasted several hours, was launched by the notorious Aisuru botnet, a variant of the Mirai malware that has become a common element in the DDoS attack arsenal. Recall that Cloudflare recently neutralized a massive

Real World and Fictional World: A Psychological and Philosophical Analysis of the 1999 Film The Matrix by Lana and Lilly Wachowski

We’ve said too many times that nowadays, social networks have become an integral part of our daily lives: it’s now natural to contact an acquaintance with a WhatsApp message, post a souvenir photo on Instagram, or share our current thoughts with Facebook friends, dedicating a significant amount of our time in front of a screen. Countless studies show the negative consequences of prolonged exposure to social media, and with the arrival of the metaverse, they could assume even greater proportions. For this reason, I decided to start with the film Matrix, a masterpiece that, already in 1999, not only depicted a dystopian

From Likes to Depression: How Social Media Can Affect Our Mental Health

Questioning changes as they occur is always a difficult, if not downright foolhardy, undertaking. Certainly, when the object of the investigation concerns the changes social media has wrought on individuals, this feeling becomes truly powerful. It’s clear to everyone how new communication technologies are radically changing the way we relate to others, our customs, our public and private behaviors. A true anthropological mutation of the masses and individuals. A metamorphosis that involves redefining the way we search for the information we need, the way we communicate, and above all, the way we interact with others. The constant and continuous use of photographs,

The US and Global Surveillance: Uncovering Section 702 of the Foreign Intelligence Surveillance Act

Privacy in the United States is a constant topic of debate, especially in the digital age. The Supreme Court has played a central role in interpreting the Fourth Amendment, which protects citizens from unreasonable searches and seizures. However, as technology advances, mass surveillance has evolved, raising questions about the balance between national security and individual rights. In this context, the Foreign Intelligence Surveillance Act (FISA) , and in particular Section 702 , introduced by the FISA Amendments Act of 2008 , are controversial legislative instruments that impact privacy in the United States and its spheres of influence. But what does all this

What is Cross-Site Scripting? An article to help you understand it in a simple way.

Author : Davide Cavallini Today I will try to use the same dialectic ( as previously done in the article on SQL injection ), and explain in a simple way what Cross Site Scripting is. Cross-Site Scripting, also called XSS, is a type of attack that isn’t directed at the server, like SQL injections, but at the client. It’s a JavaScript-based attack that runs in the user’s browser ( Chrome, Firefox, Internet Explorer, etc. ) when a website is visited. This may seem like an unhelpful type of attack, as the browser has various protections that protect the reading of local files

Spy Apps: How Spyware Works and Why It’s a Privacy Risk

Spyware (also known as spy apps) represent one of the most insidious and dangerous threats of the digital age. These are malicious programs designed to infiltrate a user’s device, collecting personal information and monitoring their activities without the victim’s knowledge. Their main characteristic is their ability to operate unnoticed, often for extended periods, allowing attackers to obtain enormous amounts of sensitive data , such as login credentials, private messages, browsing history, and even financial details. This makes them particularly insidious, as many people only discover they’ve been affected when it’s too late. Worrying about spyware isn’t an exaggeration: the consequences can be

Asus releases emergency firmware update for vulnerable DSL routers.

Asus has released an emergency firmware update for several DSL router models. The patch addresses a critical vulnerability that allows attackers to take complete control of devices without authentication. The vulnerability, identified as CVE-2025-59367, affects DSL-AC51, DSL-N16, and DSL-AC750 routers. The issue allows remote attackers to access unprotected devices accessible over the internet. The attack requires no preparation or user interaction; all that is needed is knowledge of the vulnerable router’s IP address. “An authentication bypass vulnerability has been discovered in certain DSL routers that could allow remote attackers to gain unauthorized access to the device,” Asus developers warn . The company