Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
LECS 320x100 1
Fortinet 970x120px

Category: Cybercrime and Darknet

Oracle E-Business Suite 9.8 Vulnerability: Urgent Updates Needed

Oracle has published a security advisory regarding a critical vulnerability identified as CVE-2025-61882 in the Oracle E-Business Suite . The flaw can be exploited remotely without authentication , potentially allowing malicious code to be executed on affected systems. The company recommends that its customers immediately apply the updates outlined in the advisory. Oracle emphasizes the importance of maintaining actively supported product versions and installing all critical security patches promptly. In particular, updating critical patches released in October 2023 is a prerequisite for implementing new fixes. To support immediate detection and containment of potential attacks, the alert includes a risk matrix with indicators

iPad with M5 chip spotted: Promising performance on Geekbench

An unknown iPad with an M5 chip has been spotted on Geekbench . The device scored 4,133 in the single-core test and 15,437 in the multi-core test . The listing suggests a clock speed of up to 4.42 GHz . The tablet has 12 GB of RAM, and 256 GB or 512 GB of storage are likely available. Apple is traditionally strong in processor design, and early results confirm that. According to leaked data, the M5 tablet boasts very high per-core scores. Amid rumors about the upcoming Snapdragon X Elite 2 , the top-of-the-line X2 Extreme is described as an 18-core Oryon

China launches underwater data center to reduce carbon footprint

China is preparing to launch one of the first commercial underwater data center projects . In mid-October, a capsule containing servers will be lowered into the sea off the coast of Shanghai. The initiative aims to reduce the energy consumption of traditional data centers, where cooling consumes a significant portion of resources. Highlander is developing the project in collaboration with government contractors . The rise of artificial intelligence has dramatically increased the strain on infrastructure. Traditional data centers are forced to use energy-intensive cooling systems . In the marine environment, temperature is naturally regulated by currents, making underwater systems more energy efficient

Apple in the crosshairs? Alleged 9GB data breach claim on Darkforums

Author : Inva Malaj and Raffaela Crisci 04/10/2025 – Darkforums.st: “303” Claims 9GB Data Breach on Apple.com In the early hours of October 4, 2025, a data breach claim emerged on the underground forum Darkforums from user “303” (profile: Java Maniac, rank “GOD”, reputation 197, registered January 2025). Darkforums is a leading dark web exchange for data, vulnerabilities, and cybercriminal services, providing visibility to emerging and established threat actors. Actor “303” is known for previous compromise announcements and reputation-building activities, including participation in prominent community discussions and threads. It’s common practice for threat actors to use the logo of the targeted company

When AI writes poetry: is the future of human creativity over?

In 1950, Alan Turing, considered the father of artificial intelligence, was still wondering “Can machines think?” Today, more than seventy years later, public perception seems to have changed radically: more and more people believe that machines can even “create”. The rapid advancement of AI-based big data modeling technologies— particularly the ChatGPT phenomenon —has sparked a growing sense of vulnerability among humanities scholars and practitioners. Then the sudden arrival of tools like DeepSeek , which democratize AI, intensified this fear, especially among authors and researchers working in classical literature. Thanks to these systems, even those without knowledge of meter, rhythm, or parallelism can

The AI we love! From years to just months to discover a molecule for Crohn’s disease

Antibiotics for inflammatory bowel disease can be a double-edged sword. While they suppress inflammation, they also kill beneficial bacteria, not just harmful ones. This often worsens symptoms. In this situation, generic drugs prove to be a less effective tool. Scientists at the Massachusetts Institute of Technology (MIT) and McMaster University have reported the discovery of a new molecule called enterololin . It works selectively, suppressing bacteria associated with Crohn’s disease (IBD) flare-ups, while leaving the rest of the gut microbiome largely unaffected. To understand its mechanism of action, the researchers used the generative AI model DiffDock , which reduced the time from

Discord Confirms Hack Attack: Sensitive Information at Risk

A third-party customer service provider was compromised by hackers, who gained access to partial payment information and personally identifiable information for some Discord users. The attack, which occurred on September 20, affected a limited number of users who had contacted Discord customer support and/or the Trust and Safety teams. The messaging company, in the notification sent to affected users, specifies that the attack occurred on September 20 and that “an unauthorized individual gained restricted access to a third-party customer support system used by Discord.” Originally conceived as a means of communication for video game enthusiasts, who make up more than 90% of

SoopSocks: The PyPI Package That Looked Like a Proxy But Was a Backdoor to Windows

The story of SoopSocks is one we, unfortunately, know well: a PyPI package that promises utility — a SOCKS5 proxy — but in reality introduces a well-orchestrated malicious implementation . We’re not talking about your average improvised script; SoopSocks is built with a chain of actions designed to achieve persistence, reduce noise, and establish a stable command/control channel. The package has been published to PyPI (Python Package Index) , the official Python package registry. The deceptive package, dubbed ” soopsocks ,” had 2,653 downloads before being removed. It was first uploaded by a user named “soodalpie” on September 26, 2025, the same

US raises alarm over core chip manufacturing: Too dependent on China by 2030

On October 2, the Financial Times published an analysis by Mike Kuiken, a senior national security adviser and fellow at the Hoover Institution. The expert warned of a little-discussed but significant risk: the United States’ growing dependence on China for the production of so-called “core chips.” While American political and industrial attention is focused on advanced semiconductors for artificial intelligence, Beijing is reportedly consolidating a dominant position in the market for mature chips , meaning those manufactured at 28 nanometers or higher. These components, often mistakenly considered obsolete, are actually essential to the functioning of a wide range of technologies: automobiles, medical

Can a backdoor be implemented for only one country? Apple resists UK demands.

The United Kingdom has again attempted to force Apple to access encrypted backups of user data stored on iCloud . The new request comes six months after the company disabled its most secure cloud storage feature, Advanced Data Protection, for all users in the country. Apple’s decision followed an earlier, more restrictive request from the British government, which covered the data of not only UK residents but also US citizens, sparking a diplomatic row with Washington. According to sources familiar with the matter, the UK Home Office sent Apple a notice in early September ordering it to implement a system to access