Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Enterprise BusinessLog 320x200 1
Redhotcyber Banner Sito 970x120px Uscita 101125

Category: Cybercrime and Darknet

Australia: Microsoft accused of deceptive practices in Microsoft 365 renewals

Australia’s competition watchdog, the ACCC, said subscribers to Microsoft 365 Personal and Family plans were being asked to pay higher prices for Copilot or cancel their subscriptions. According to the ACCC, this information was false or misleading because there was a third, undisclosed option for subscribers, who could keep their existing “classic” plan without Copilot or the price markup. With the integration of Copilot, prices increased from $109 to $159 for the Personal plan and from $139 to $179 for the Family plan. “Following a detailed investigation, we will argue in court that Microsoft deliberately omitted reference to the Classic plans in

Criminal Hackers Breach US Nuclear Weapons Production Facilities

Government hackers breached a nuclear weapons component manufacturing facility in the United States by exploiting vulnerabilities in Microsoft SharePoint. The incident affected the Kansas City National Security Campus (KCNSC) , part of the U.S. Department of Energy’s National Nuclear Security Administration (NNSA) . According to some sources , the attack occurred in August and involved the exploitation of unpatched bugs tracked under CVE-2025-53770 and CVE-2025-49704, which allow remote code execution on the SharePoint server. The facility, operated by Honeywell Federal Manufacturing & Technologies, produces most of the non-nuclear mechanical and electronic components for the U.S. nuclear arsenal. It houses departments responsible for

The secret behind Space Invaders’ speed? A technical limitation of the hardware

In 1978, Taito’s Space Invaders captivated audiences with its seemingly ingenious gameplay: the more aliens you shot down, the faster the remaining ones moved. A crescendo of tension that marked the history of arcade video games. But, as C/C++ programming expert Zuhaitz revealed, that relentless pace wasn’t the result of creative intuition, but rather a technical limitation of the processor the game was based on. According to an analysis published on October 27, the behavior that made Space Invaders so iconic is actually the result of a bottleneck in the Intel 8080 processor, introduced in 1974 . This chip, equipped with approximately

CoPhish is coming! Microsoft Copilot Studio used to steal accounts

Attackers are using an advanced phishing technique, known as CoPhish, that leverages Microsoft Copilot Studio to trick users into granting unauthorized access to their Microsoft Sign In ID accounts. A recent report details the attack and highlights how, despite Microsoft’s efforts to strengthen its consent policies, significant vulnerabilities remain in cloud-based AI tools. The growing adoption of tools like Copilot by organizations highlights the need for careful oversight of low-code platforms . In this space, user-configurable features designed to boost productivity can inadvertently facilitate phishing. This attack, discovered by researchers at Datadog Security Labs , uses customizable AI agents hosted on legitimate

Anatomy of a Data Theft: Technical Analysis of the “Formbook” Infostealer

In the cyber threat landscape, few malware programs are as persistent and widespread as Formbook . What began as a simple keylogger and form grabber has evolved into a powerful infostealer sold under the Malware-as-a-Service (MaaS) model, making it accessible to a wide range of cybercriminals. Its ability to exfiltrate credentials from browsers, email clients, and other software makes it a favored tool for gaining initial access to corporate networks. In this article, we will analyze a sample of a multi-stage dropper designed to distribute the Formbook infostealer, and, based on the evidence collected, we will illustrate the countermeasures proposed by ELMI

OpenAI is working on a neural network for music creation

According to The Information, OpenAI is actively working on its own neural network for music creation , which will compete with projects like Suno and Udio. The publication’s sources report that the new product is expected to have several modes . First, it will simply generate a track based on a text request. Second, the model will be able to create music for a user-recorded voice track or video. This significantly expands the range of AI applications. OpenAI is very cautious about copyright issues, especially after the launch of Sora 2, which initially generated copies of many famous characters, both real and

Oracle VirtualBox Vulnerability: Risk of Virtual Machine Escape

BI.ZONE specialists have identified two vulnerabilities (CVE-2025-62592 and CVE-2025-61760) in Oracle VirtualBox. When combined, they allowed an attacker to exit a virtual machine and reach the ARM-based macOS host system. It is noted that this is the first publicly known vulnerability chain of this kind since the release of VirtualBox version 7.1.0 in 2024, which introduced ARM support to macOS. CVE-2025-62592 (CVSS score 6.0) was discovered in the QemuRamFB virtual graphics card in the MMIO read handler qemuFwCfgMmioRead . This vulnerability allows an attacker to read an unlimited amount of memory beyond the bounds of the array. This allows an attacker to

YouTube Ghost Network: The phantom network that infected millions of users

Google specialists removed over 3,000 videos from YouTube that spread hidden information disguised as hacked software and video game cheats. Check Point researchers dubbed this campaign ” YouTube Ghost Network” and reported that it had been active since 2021, with a sharp increase in 2025, when the number of malicious videos tripled. According to researchers, the perpetrators of these attacks hijacked legitimate YouTube accounts and, using their identities, posted tutorials promising free pirated versions of Photoshop and FL Studio, as well as cheats and hacks for Roblox. Instead of the promised software, victims received the Rhadamanthys and Lumma infostealers, which stole credentials

While Pope Francis is alive and continues his ministry, disinformation is rampant.

A survey conducted by the European Broadcasting Union (EBU), with support from the BBC, has highlighted that the most popular chatbots tend to distort news , changing its meaning, confusing sources and providing outdated data. The project, which involved 22 editorial teams from 18 countries, saw experts subject ChatGPT, Microsoft Copilot, Google Gemini, and Perplexity to thousands of standardized queries, comparing the responses obtained with those actually published. The results were quite disturbing: approximately half of the responses contained significant errors, while eight out of ten cases contained small inaccuracies. According to the report, 45% of the responses contained significant problems, 31%

New submarine cables in the Black Sea: Europe seeks digital independence from Russia

Eastern Europe is preparing for a new phase in telecommunications security. An ambitious submarine cable project, called Kardesa , will connect Bulgaria, Georgia, Turkey, and Ukraine without crossing Russian territorial waters, aiming to reduce dependence on Moscow for digital infrastructure. Construction is scheduled to begin in 2027 . The new route aims to create a more stable and politically independent data corridor between Europe and Asia . Currently, only one cable connects Georgia and Bulgaria across the Black Sea , while other routes remain vulnerable because they pass near Kremlin-influenced routes. Kardesa intends to change this configuration, offering a more direct and