Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
2nd Edition GlitchZone RHC 320x100 2
Banner Ancharia Desktop 1 1

Category: Cybercrime and Darknet

Electricians and plumbers: They are the real winners of the AI boom

Jensen Huang, CEO of NVIDIA, has openly stated that the real winners in the AI boom, at least in the short to medium term, will be electricians, plumbers, and skilled craftsmen in general. Yes, those very same workers: the “blue-collar” workers who transform the megawatts and megadata of new data centers into reality. A vision that clashes (and at the same time fits) with the other side of the coin: the growing fear of a speculative bubble in AI, which risks yet another “technological collapse” if the numbers don’t hold up to the impact of reality. Huang’s Paradox: AI Is Software, But

Towards “legal technology”: legal education in the digital age must be technological.

As a criminal lawyer and professor of Criminal Computer Law, a student of the late Vittorio Frosini, a pioneer of legal informatics in Italy, I constantly reflect on the state of our education. This reflection clashes with the acceleration of history: Frosini’s 1968 work, Cybernetics, Law and Society , though avant-garde for its time, is today a benchmark for measuring how well the Italian legal system has kept pace with the “digital society” he anticipated. My own professional trajectory reflects this evolution. When I published my first book, Teoria e Pratica nell’interpretazione del crime informatico (Theory and Practice in the Interpretation of

ProxyCommand: The Little String That Opens a Port for Exploits

Yesterday, a vulnerability in OpenSSH, CVE-2025-61984, was published that potentially allows command execution on the client when ProxyCommand is used with usernames containing control characters (e.g., newlines). Some OpenSSH input streams were not properly stripping control characters from usernames. An attacker could exploit this behavior by constructing a username containing, for example, a newline followed by a string that should be interpreted as a command. When that username is inserted into the string invoked by the ProxyCommand, some shells bypass the syntax error introduced by the newline and continue execution: the next line can then be executed as the payload. Essentially, a

The AI bubble: fears of a new technological meltdown grow

At DevDay, OpenAI’s annual conference this week, CEO Sam Altman took questions from reporters, an increasingly rare occurrence among tech leaders. Altman acknowledged the uncertainty surrounding the AI industry today, saying that “many areas of AI are in a state of flux.” Fears of a new tech bubble are growing in Silicon Valley. The Bank of England, the International Monetary Fund, and JPMorgan CEO Jamie Dimon have expressed similar concerns. Dimon, in an interview with the BBC, emphasized that ” most people should feel more uncertain about the future.” During Italian Tech Week in Turin, Jeff Bezos, founder of Amazon and one

DAS: The world’s ear hidden in submarine cables

Over 1.2 million kilometers of fiber optic cables lie on the ocean floor, long considered solely part of a global telecommunications network. However, distributed acoustic sensing (DAS) technology , rapidly emerging from the experimental stage, is opening up a fundamentally new field : the use of these lines for underwater monitoring and anti-submarine warfare. What until recently seemed like a hypothesis is already beginning to materialize in concrete military developments. DAS transforms a conventional fiber optic cable into a continuous chain of sensitive acoustic sensors. When a short pulse of laser light passes through the fiber, the reflected signals are modified by

Hacker culture pioneer Peter Samson plays “Boards of Canada” on PDP-1

In a world where music has long since migrated to streaming and digital platforms, one enthusiast decided to go back six decades, to a time when melodies could still come to life through the glow of lamps and punched tape. The older PDP-1 computer, famous for being the birthplace of one of the first video games, suddenly spoke with the voices of the Boards of Canada, playing their composition ” Olson ” using paper tape and flashing lights. The project was implemented by Peter Samson, a hacker culture pioneer at the TMRC and an engineer and volunteer at the Computer History Museum

Crimson Collective claims alleged Nintendo hack: bluff or real breach?

This time, hackers are targeting Nintendo , the historic Japanese video game company that has been tooth and nail for decades defending its intellectual property and the industrial secrets that fuel the Mario, Zelda, and Pokémon universes. The Crimson Collective group, already known for having previously hacked the network of open source software giant Red Hat , has claimed to have compromised Nintendo’s internal servers, gaining access to the company’s confidential files and data. Cybersecurity intelligence firm Hackmanac shared a screenshot on X that allegedly shows internal Nintendo folders containing data such as production assets, developer files, and backups. However, no specific

Critical vulnerabilities in Microsoft Defender for Endpoint: security risks

Security flaws have been discovered in network communication between Microsoft Defender for Endpoint (DFE) cloud services , allowing attackers, following a breach, to bypass authentication, manipulate data, release sensitive information, and even upload malicious files within investigation packages. A recent analysis by InfoGuard Labs detailed these vulnerabilities , which highlight the risks still present within Endpoint Detection and Response (EDR) systems, which could undermine incident management efforts. The main concern, as identified by InfoGuard Labs , is requests sent by the agent to endpoints, such as https://[location-specific-host]/edr/commands/cnc, to execute specific commands, including isolation, forensic data collection, or scanning. The research builds on

Between AI and fear, Skynet teaches: “We’ll build bunkers before launching AGI.”

The quote, “We’ll definitely build a bunker before we launch AGI,” that inspired the article, was attributed to a Silicon Valley leader, though it’s unclear who exactly he meant by “we.” The phrase perfectly captured the paradox of our times , and the irony is evident: those who are advancing the world’s most sophisticated artificial intelligence are the same ones who are terribly worried about its repercussions. While they continue their research, they are simultaneously devising escape strategies. The situation is similar to that of someone who builds a dam knowing it will eventually fail, but instead of reinforcing it, prefers to

GitHub is migrating to Azure! And goodbye to new development for a year.

When Microsoft acquired GitHub in 2018, the company tried to stay away. The platform developed relatively independently until things began to change in recent months. The departure of GitHub CEO Thomas Domke in August and the gradual merger with Microsoft’s internal structure have solidified this new direction. As The New Stack has learned, the next step in this integration will be a complete migration of GitHub’s infrastructure to the Azure cloud. To achieve this, the company even plans to delay the launch of new features. In a letter to employees, CTO Vladimir Fedorov explained that GitHub’s Virginia headquarters is no longer able