Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
2nd Edition GlitchZone RHC 320x100 2
970x120

Category: Cybercrime and Darknet

Human Washing Machine Launched: Japan’s Science Unveils Unique Device

Japanese company Science has launched a washing machine for humans. The 2.30-meter-long capsule bathes a person in 15 minutes and attracted considerable interest at the recently concluded Osaka Expo. The device is modeled after the human washing machine presented at the 1970 Expo, also held in Osaka. As reported by the Indian news site NDTV , the president of Science is said to have seen this capsule as a child, which apparently left a lasting impression on him. Users lie on a bed inside the capsule and are then covered in foam and a fine mist. During the wash, relaxing music and

Brazilian Systems Targeted in Sophisticated OAST Exploit Campaign

Security researchers have discovered a sophisticated exploit campaign that leverages a private out-of-band application security testing (OAST) service hosted on Google Cloud infrastructure. The campaign primarily targets systems in Brazil and exploits over 200 common vulnerabilities (CVEs). Attack method OAST endpoints typically help attackers verify the success of exploits for command execution, server-side request forgery (SSRF), and deserialization. Most attackers use publicly available OAST services such as toast.fun and interact.sh , but the authors of this threat operation operated a private domain called i-sh.detectors-testing.com. VulnCheck’s Canary threat intelligence system detected approximately 1,400 exploit attempts related to this infrastructure between October 12 and

Australian Man Jailed for Evil Twin Wi-Fi Scam Targeting Airline Passengers

An Australian court has convicted a 44-year-old man who stole the personal data of airline passengers and airport visitors over several months . He was sentenced to seven years and four months in prison for creating fake Wi-Fi networks and then using the stolen information. This story began in April 2024, when employees of an Australian airline discovered a suspicious wireless network on board a plane. After contacting the Australian Federal Police (AFP) , law enforcement arrested the suspect, then 42 years old. A search of his carry-on luggage uncovered a Pineapple portable Wi-Fi device, a laptop, and a mobile phone. Police

KrakenBite Phishing Service Exposed

The underground cybercrime market continues to evolve rapidly, fueled by specialized groups designing and selling tools for increasingly sophisticated digital scams. Among these, a particularly active player in recent weeks is KrakenBite , known for offering turnkey phishing services to cybercriminals around the world. In a recent announcement on their channels, spotted by Red Hot Cyber’s DarkLab group, the group said they had added five new phishing pages targeting Moroccan banks , bringing the total number of pages available in their “catalogue” to 115 . The Criminal Offer: Phishing Pages for Every Market The post presents a staggering list of targeted international

ADC Aerospace Hit by Play Ransomware Attack, Data Breach Feared

American aviation and defense components manufacturer ADC Aerospace has found itself in the spotlight due to a possible cyber attack by the Play ransomware group, which appeared on their blog where criminal hackers claim to have compromised company data and customer documents. Disclaimer: This report includes screenshots and/or text from publicly available sources. The information provided is for threat intelligence and cybersecurity risk awareness purposes only. Red Hot Cyber condemns any unauthorized access, improper dissemination, or misuse of this data. It is currently not possible to independently verify the authenticity of the information reported, as the organization involved has not yet released

Microsoft 365 Security Risk: Interface Poisoning Attacks

This article analyzes the disclosure submitted to Microsoft and available in English on digitaldefense , where images, demonstration videos and a Python code example are available. In recent years, digital communications security has amplified a certain paradigm: attacks no longer aim simply to violate the infrastructure, but to dismantle user trust by exploiting every type of cognitive hook. If email, calendars, and collaboration platforms represent the center of gravity of corporate life, the most effective attack surface is not the purely technical one, but the one capable of impacting the human factor. The phenomenon analyzed in this article certainly doesn’t concern marginal

Calendar Subscriptions: A Hidden Danger in Your Digital Life

Digital calendars have long been a convenient way to keep track of daily activities, but new research from Bitsight shows that this familiar tool can become a real attack channel. Bitsight researchers discovered over 390 abandoned domains associated with iCalendar sync , which received daily requests from approximately 4 million iOS and macOS devices. Anyone who re-registers these domains gains the ability to stealthily add events to users’ calendars, complete with links, files, and any other content. The problem is that third-party calendar subscriptions are typically created with a single click, for holidays, event calendars, discounts, or app reminders . But this

Airbus A320 Recall Due to ELAC System Failure Caused by Solar Flares

Airbus has announced the recall of approximately 6,500 A320 aircraft due to potential failures in the ELAC control system caused by powerful solar flares. The recall followed a sudden loss of altitude during a flight from Cancun, Mexico, to Newark, which resulted in an emergency landing and 15 injuries to passengers. According to Reuters , the decision to recall the aircraft was made following an investigation into the JetBlue A320 crash. The investigation determined that the crash was caused by the ELAC subsystem’s incorrect response to intense solar flares. As a result, the system misinterpreted the movements of the control column .

OpenAI Faces Fierce Competition from Google’s Gemini 3

OpenAI, a company valued at around $500 billion, is facing increasingly fierce technical competition . Google’s latest version of Gemini 3 , in particular, outperforms OpenAI’s GPT-5 in several areas. “The world today is profoundly different from the situation two years ago, when OpenAI was ahead of everyone else,” Thomas Wolf, co-founder and chief scientific officer of the artificial intelligence platform Hugging Face, told the Financial Times . OpenAI CEO Sam Altman himself recently admitted in a leaked memo to staff that the company must prepare for a period of intense competition. Just a year ago, Google’s position seemed less favorable, but

Leonardo’s Michelangelo Dome: AI-Powered Defense Against Hypersonic Threats

Italian defense company Leonardo has unveiled its new Michelangelo Dome system . According to the company, it is designed to counter hypersonic missiles and mass drone attacks . During the technical presentation to the Italian Minister of Defense and Chiefs of Staff, CEO Roberto Cingolani announced plans to begin deployment as early as 2026 and reach full operational capability by 2028. The name says it all, and the resemblance to Israel’s famous Iron Dome is clearly intentional. The Israeli system, operational since 2011, served as a model. But Michelangelo Dome goes much further: it is not conceived as a single weapons system,