Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Fortinet 320x100px
970x20 Itcentric

Category: Cybercrime and Darknet

Huawei launches data center AI card: Atlas 300I DUO, dual GPU, 140 TFLOPS

On October 19, Gamers Nexus revealed details of the Huawei Atlas 300I DUO , a dual-core AI inference card designed for intelligent computing in data centers. It is a single-slot , fanless accelerator that integrates two GPUs and offers a balance between computational power and power consumption. Technical specifications and performance The Atlas 300I DUO features 16 cores clocked at 1.9 GHz and up to 96 GB of LPDDR4X ECC memory , with a bandwidth of 408 GB/s . The system connects via PCIe 4.0×8 , while power consumption reaches 150 W. On the performance front, the card offers 80 TOPS of

Critical vulnerability in Windows SMB client: CISA raises alarm

On October 20, 2025, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an urgent alert regarding a critical vulnerability, CVE-2025-33073, in Microsoft’s Windows SMB client. This flaw, characterized by inadequate access control, could lead to significant escalation of privileges for attackers. The vulnerability poses a significant risk to cyberattacks worldwide, which is why it was urgently reported. CISA urges immediate action in its bulletin: apply the latest Microsoft patches as outlined in their security advisories or follow Binding Operations Directive (BOD) 22-01 for Federal Cloud Services. According to the CISA catalog of known exploited vulnerabilities (KEV), attackers can create a script

Data Anonymization: Protecting Privacy Without Losing Utility

In an era where personal data is being produced and shared on a massive, daily basis, the concept of anonymization takes on a central role in the debate on privacy protection and the ethical reuse of data. With the advent of the General Data Protection Regulation (GDPR), the European regulatory framework introduced precise definitions and stringent obligations for the processing of personal data, clearly distinguishing between identifiable, pseudonymized, and fully anonymized data. According to the GDPR, data can only be considered anonymous when it is rendered so irreversibly, meaning when it is no longer possible to directly or indirectly identify the data

NIS2 and new ACN guidelines: what changes for companies and how to prepare

The European NIS2 directive represents a turning point for cybersecurity in Italy and Europe, imposing new responsibilities on public and private organizations in managing cyber risks. To support the compliance process at all stages, the National Cybersecurity Agency ( ACN ) recently published a guide to reading the ” NIS Guidelines – Basic Specifications,” a document that clarifies the obligations for essential and important NIS entities involved and defines the timeframes and methods for adopting minimum security measures and reporting incidents. This document provides valuable guidance for companies and public bodies in understanding how to meet the obligations set forth in Legislative

RHC’s HackerHood Reveals Two New 0days on Zyxel Products

Security researcher Alessandro Sgreccia , a member of Red Hot Cyber’s HackerHood team, has reported two new vulnerabilities to Zyxel affecting several devices from the ZLD (ATP/USG) family. Alessandro Sgreccia ( Ethical hacker of HackerHood known for issuing various CVEs, such as the RCE CVE-2022-0342 from 9.8 on Zyxel), triggered a responsible report to Zyxel who promptly responded by fixing the issue. Zyxel promptly analyzed the provided reports and published an official advisory confirming the flaws and indicating the affected firmware versions and the available fix releases in its security bulletin . CVE-2025-9133 – Missing Authorization This vulnerability, with a CVSS v3.1

F5 BIG-IP Vulnerability: 266,000 Devices at Risk Worldwide! 2,500 in Italy

The Cybersecurity and Infrastructure Security Agency (CISA) and the Multi-State Information Sharing & Analysis Center (MS-ISAC) are issuing this Joint Cybersecurity Advisory (CSA) in response to the active exploitation of CVE-2022-1388 . This vulnerability, recently disclosed in certain releases of F5 Networks, Inc. (F5) BIG-IP, allows an unauthenticated attacker to gain control of affected systems via the management port or personal IP addresses. F5 released a patch for CVE-2022-1388 on May 4, 2022, and proof-of-concept (POC) exploits have since been made public, allowing less sophisticated attackers to exploit the vulnerability. Due to previous exploitation of F5 BIG-IP vulnerabilities , CISA and MS-ISAC

Amazon Web Services Cloud Outage, Global Issues

A major outage in Amazon Web Services (AWS) cloud services has caused widespread connection issues around the world, affecting major platforms such as Snapchat, Facebook, and Fortnite , along with numerous other websites and applications. According to data provided by Downdetector , a portal that monitors Internet outages in real time, an increasing number of online services reported malfunctions throughout the day. Those affected include cryptocurrency exchange Coinbase and artificial intelligence company Perplexity . In an official statement, AWS reported that it has identified the root cause of the failure and initiated recovery procedures, confirming significant progress towards a complete resolution. “We

Google Announces Gemini 3.0: Artificial Intelligence Evolves Toward AGI

At the Dreamforce conference in San Francisco, Google CEO Sundar Pichai announced that Google will release a new version of its artificial intelligence, Gemini 3.0 , later this year. The news was reported by Techzine, which was present at the Salesforce event. Google recently unveiled the Gemini 2.5 Computer Use model, but the next generation will be released later this year. According to Pichai, “Gemini 3.0 will be an even more powerful AI agent, demonstrating more significant progress than in recent years.” He emphasized that Google Research, Google Brain, and Google DeepMind are participating in the development. As BusinessKorea reported, these teams

They’re Coming! Unitree Robotics Launches the H2 Destiny Awakening Humanoid

Chinese company Unitree Robotics has challenged the leadership of American robotics with the launch of its H2 “Destiny Awakening” humanoid robot. The robot combines a human form with surprisingly agile movements, designed for both domestic and industrial tasks. Launched on Monday, October 20, the company revealed key details of the humanoid, stating that it stands 180 centimeters tall and weighs 70 kilograms. The demonstration video shows that the humanoid can easily perform various tasks, including fluid dance choreography and complex martial arts maneuvers. This marks a significant leap in stability and flexibility compared to its predecessor, the H1. With the launch of

The Intel 386 processor turns 40: the 32-bit era began

October 20, 2025, marks a significant anniversary in the history of computing: the Intel 80386 processor, also known as the i386 , celebrates its 40th birthday . And it’s a big birthday! Launched in October 1985, it represented a huge turning point in personal computer technology, introducing 32-bit architecture to the PC world for the first time. Developed on a 1-micron manufacturing process , the chip integrated 275,000 transistors and reached a maximum frequency of 16 MHz , supporting up to 4 GB of memory . In addition to higher performance, the 386 introduced the IA-32 instruction set , protected mode ,