Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Redhotcyber Banner Sito 320x100px Uscita 101125
Enterprise BusinessLog 970x120 1

Category: Cybercrime and Darknet

Lancelot, the secure federated learning system

A team of researchers in Hong Kong has released a system called Lancelot, which represents the first practical implementation of federated learning while also being protected from data tampering attacks and confidentiality breaches. Federated learning allows multiple participants (clients) to jointly train a model without revealing the source data. This approach is particularly important in medicine and finance, where personal information is strictly regulated. However, these systems are vulnerable to data poisoning : an attacker can upload fake updates and distort the results . Federated learning methods have partially solved this problem by discarding suspicious updates, but they have not protected against

FlorentIA: A Look at Artificial Intelligence in the Heart of Florence

At the beginning of this month, Florence hosted a unique event on October 1st: FlorentIA . FlorentIA presents itself as an unmissable event for understanding Artificial Intelligence and its multiple impacts on the lives of individuals, businesses, public administration, schools, and, more generally, the entire global context. The event was promoted by S&NT , a leader in IT solutions and consulting, with the support of partners Trend Micro and NinjaOne , under the patronage of AIxIA and in compliance with the Public Notice of the Tuscany Region for the search for parties interested in activating joint initiatives for the promotion of Artificial

ChatGPT writes the perfect scam… but the scammer leaves the AI instructions inside.

At first glance, the email seemed flawless. A well-structured PagoPA payment reminder , with formal language, references to the Highway Code and even a blue “Access the PagoPA Portal” button identical to the real one. A masterpiece of social engineering, sent to us by Paolo Ben , so carefully crafted that it appears authentic even to the most attentive eyes. But then, like in a comic sketch, something broke. Towards the end of the message, after the usual warnings about deadlines and penalties, a … surreal section appears. Among the instructions “for better Gmail reception,” the email begins to mention SPF, DKIM,

Critical vulnerability in Linux-PAM: Privilege escalation with CVE-2025-8941

A high-severity vulnerability has been identified in the Pluggable Authentication Modules (PAM) framework with the identifier CVE-2025-8941. This vulnerability originates in the core of Linux operating systems and allows attackers with local access to exploit symlink attacks and race conditions to achieve full escalation of root privileges. Security experts warn that this issue requires immediate attention, especially for servers and desktops that rely on Linux-PAM for user authentication. Even the most trusted open source tools are not immune to risk, as root access, the highest level of control in Unix-like systems, can lead to data breaches and large-scale system compromises, underscoring the

Gmail introduces trusted contacts to recover accounts

A new Gmail security feature will allow users to restore access to their accounts with the help of friends or family. Trusted contacts (Recovery Contacts) can be used to obtain recovery codes when other methods aren’t available. Each user can specify up to 10 trusted contacts per account and can also act as a trusted contact for up to 25 other accounts. Account recovery through trusted contacts Recently, Google and other major market players have actively promoted the use of passkeys , seen as a replacement for traditional passwords. This technology is considered the future of authentication. The problem, however, is that

China accuses US of cyber attack on National Time Service Center

China’s Ministry of State Security announced it has discovered “irrefutable evidence” of a cyberattack on the National Time Service Center, the agency responsible for maintaining Beijing’s standard time. The agency claimed that the U.S. National Security Agency (NSA) was behind the operation. The center is responsible for ensuring accurate time for the country’s communications, financial services, and other critical systems. According to the Ministry , the operation began in 2022. The attackers allegedly exploited a vulnerability in a foreign brand’s smartphone messaging service and gained access to employees’ phones, including their data. In 2023 and 2024, the attackers allegedly used dozens of

Made in China! Muxi presents the Xiyun C600 general-purpose GPU

Muxi Integrated Circuit (Nanjing) Co., Ltd. officially unveiled the Xiyun C600 , the first general-purpose GPU entirely made in China , marking a crucial milestone in the development of the domestic high-performance GPU industry. The chip, the result of a project started in February 2024 , is based on fully autonomous intellectual property and a closed, domestic supply chain , including design, manufacturing, packaging and testing. The Xiyun C600 is currently in the functional test phase and is expected to enter mass production by the end of the year . The GPU integrates high-capacity video memory and hybrid multi-precision computing power ,

9.9 Score! Microsoft Fixes Critical Vulnerability in ASP.NET Core

Microsoft has fixed a dangerous vulnerability in Kestrel web server for ASP.NET Core . It has been assigned the identifier CVE-2025-55315. The flaw allows an attacker logged in with a valid account to inject an additional request, thereby hijacking other users’ sessions or bypassing external security filters. The official description emphasizes that the attack can lead to the leak of confidential data, including user credentials, modification of files on the server, and a server crash with subsequent impact on resource availability. To address the vulnerability, Microsoft has provided clear recommendations for different platform versions and deployment methods. Users of .NET 8 and

Boris Johnson is enthusiastic about AI: he uses ChatGPT for his books.

Former British Prime Minister Boris Johnson has expressed his enthusiasm for artificial intelligence, revealing in an interview that he uses ChatGPT to write his books. “I love AI. I love ChatGPT. I love it,” he told Al Arabiya, adding that “ChatGPT is really cool.” Johnson, who studied classics at Oxford University, said he uses the platform not only to analyze works like Homer’s “Odyssey” but also to help him in the process of writing books. “I’m writing some books. I only use it (ChatGPT) to ask questions,” he said. “I know the answer in advance, but ChatGPT always says, ‘Ah, your questions

China challenges Intel: Loongson launches fully independent 3C6000 CPU

Wang Songyu , Deputy General Manager of Loongson Technology ‘s Business Division, reaffirmed on October 18 the company’s strategy of developing fully independent CPUs , in line with China’s national strategic priorities. According to Wang, Loongson will continue to pursue this direction without being influenced by foreign sanctions , emphasizing that technological autonomy is a necessity for the country today. Among the ten major scientific and technological achievements mentioned in the report of the 20th National Congress of the Communist Party of China , several initiatives have adopted or integrated Loongson processors, disproving the old preconception that “more independence means less efficiency.”