Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
320x100 Itcentric
UtiliaCS 970x120

Category: Cybercrime and Darknet

Be careful when using SSDs! Without power, you risk data loss

XDA Developers reminds us that using solid-state drives for long-term storage is risky. If SSDs are left without power for years, data can become corrupted or even disappear entirely. Unlike HDDs , which store data on magnetized platters, SSDs write information by changing the electrical charge in NAND flash cells . Flash memory is considered non-volatile: data is retained even after power is lost. However, the length of time an SSD can reliably store data without being connected to a power source is limited. According to Joint Electron Device Engineering Council (JEDEC) specifications, even inexpensive drives with QLC NAND can retain data

Quantum Computing vs. Artificial Intelligence: Which Will Really Change the Future?

Quantum mechanics remains a complex and mysterious field, both difficult to explain and difficult to understand. This branch of physics studies the unusual behavior of tiny particles, phenomena that are opening up new scientific possibilities with potentially revolutionary applications. Despite the pronouncements and investments of tech giants like Microsoft and Google, quantum computing remains less visible compared to the growing focus on artificial intelligence (AI). Generally, while AI is predominantly software-oriented and relies on existing hardware, quantum technology requires specialized physical devices such as sensors and quantum computers, which are still bulky, expensive, and rare today. Brian Hopkins , vice president and

ToddyCat APT Group Targets Microsoft 365 Email Security

Email security continues to be one of the most critical points in modern cyber attacks. While compromising a Windows domain is already a success for a malicious actor, gaining access to corporate email accounts can open the door to espionage, fraud, extortion, and difficult-to-detect lateral movement . ToddyCat: The ability to target any organization It is in this context that the operational evolution of ToddyCat takes place, an APT group already known for its advanced techniques and its ability to target government and military organizations. In recent months, the group has demonstrated a significant leap in quality, introducing new ways to access

Tor Boosts Security with Counter Galois Onion CGO Encryption

The Tor project has announced the introduction of a new encryption scheme, called Counter Galois Onion (CGO) , intended to replace the previous Tor1 Relay method. The update aims to strengthen network security and counter threats from online attackers. The new system has already been implemented in Arti , the Rust implementation of Tor, and in the C version of Tor Relay. According to the development team, the old Tor1 system had three main weaknesses: vulnerability to tagging attacks , lack of forward secrecy , and insufficient authentication strength . Among these, tagging attacks are considered the most significant risk, as Tor1

WormGPT 4: AI-Powered Cybercrime Tools on the Rise

Cybercriminals no longer need to convince ChatGPT or Claude Code to write malware or data-stealing scripts. A whole class of specialized language models, specifically designed for attacks, already exists. One such system is WormGPT 4, which advertises itself as “the key to borderless artificial intelligence .” It carries on the legacy of the original WormGPT model, which emerged in 2023 and subsequently disappeared due to the rise of other ” toxic ” LLMs, as highlighted in the Abnormal Security study . According to experts at Unit 42 at Palo Alto Networks, sales of WormGPT 4 began around September 27, with advertisements appearing

EU lawmakers push for Microsoft alternative to boost tech sovereignty

A group of members of the European Parliament have called for Microsoft to abandon its internal use of products and switch to European solutions. Their initiative stems from growing concerns about the dependence of key infrastructure on large American companies and the potential risks to the EU’s digital security. The authors of the appeal believe that European institutions must set an example of technological independence and lead the transition to their own platforms. The document, which will be delivered to the President of the European Parliament, Roberta Metzola, lists 38 signatories from various political groups. They insist on the need to phase

Investment Scam Alert: How to Avoid Losing Thousands

Hi everyone… my name is Marco, I’m 37 years old and I work as an administrative clerk in an accounting firm. This is my first time speaking in front of you all, and I’m a little emotional… and I assure you, it’s not easy. But after what I’ve been through, I’ve realized that keeping quiet gets you nowhere, while sharing can save someone else from the same problem I’ve been through. I’ve always considered myself a cautious person: I pay for everything by card, I check my bank statements, I keep an eye out for suspicious emails, and when I don’t understand

Trump Launches Genesis AI Mission to Revolutionize US Science

US President Donald Trump signed an executive order, ” Launching the Genesis Mission,” establishing a national program for the use of artificial intelligence in science. The document was published on the White House website . The preamble compares the initiative to the Manhattan Project in scope and urgency and promises ” a new era of scientific discovery accelerated by artificial intelligence.” According to Politico , presidential science adviser Michael Kratsios calls the Genesis Mission ” the largest mobilization of federal scientific resources since the Apollo program .” U.S. Secretary of Energy Chris Wright, an entrepreneur who made his fortune in fracking ,

Cybersecurity in the Middle East: Egitto and Qatar Lead the Way

Global attention to cybersecurity continues to grow in a context dominated by digital transformation and the rapid spread of artificial intelligence (AI) technologies, making it easier to identify vulnerabilities and conduct complex attacks. In this context, a country’s ability to ensure protection, coordination, training, and international cooperation has become a key indicator of national stability. In the 2024 Global Cybersecurity Index, Egypt and Qatar achieved a maximum score of 100, placing them among the 12 highest-performing countries globally. This result was achieved thanks to compliance with the index’s five pillars: legislative framework, technical protection, organizational structure, capacity development programs, and international collaboration

US States Crack Down on VPNs and Online Privacy for Minors

Several U.S. states are debating new restrictions that could significantly change traditional approaches to online privacy . Legislators in Wisconsin and Michigan are considering initiatives to combat material deemed harmful to minors. The focus is on websites with content reserved for those aged 18 and over, as well as platforms where hate speech and other objectionable information may appear. In these debates , the idea is increasingly gaining ground that protecting minors requires not only age-based filters but also tool controls. VPN services are considered one of these tools. In this context, a bill has been introduced in Wisconsin that would require