Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
320x100 Itcentric
LECS 970x120 1

Category: Cybercrime and Darknet

Discovering the Emotional Firewall! The Vulnerability No One Is Patching

There is one critical issue in the cyber arena that we have not yet patched: our emotional firewall . This is not a network problem, but a collective mental block. We are called to dismantle our perception of error and recognize it not as a systemic failure, but as the most valuable data-set for our continuous learning. For those of us who live under the constant pressure of vulnerability and bugs , this mental transformation is not a luxury: it is the key to preventing burnout and forging unassailable resilience . Let’s look specifically at how to apply our security principles to

Not the children! 8,000 personal data of children from a nursery school are at risk of being published.

A criminal hacker group calling itself Radiant has claimed responsibility for stealing the personal data of over 8,000 children enrolled in daycare centers run by London-based Kido International . The news was released this week via a dark web portal linked to the group. The attackers released as evidence the personal details of 10 minors who allegedly attend one of 18 Kido institutions in the London area. The information disclosed includes names, photographs, addresses, and family contact information. Radiant announced its intention to release additional data: 30 child profiles and 100 employee profiles. The group stated, via posts on its data leak

Programming in crisis: Junior job openings plummet as AI transforms the workplace.

Artificial intelligence is no longer a futuristic concept from science fiction films . It is already part of our daily lives and, above all, it is revolutionizing the world of work . Until a few years ago, programming was considered one of the safest and most promising professions: anyone who learned to write code was practically guaranteed a job, even without years of experience. Today the situation has changed radically. With the arrival of generative AI tools capable of generating code, detecting errors, and even developing complete applications , many tasks that were previously entrusted to novice programmers are now performed by

Work, Artificial Intelligence, and Marketing: What Skills Will We Need in 2025?

In recent years, the marketing industry has undergone a radical transformation : today, one in two positions requires artificial intelligence skills. According to representatives from the agency Digital Duke, the ability to use AI tools is no longer a plus, but an essential requirement for those working in content creation, short videos, and promotional copy. Veronika Klimova, owner of the digital talent management agency Marketlead.me, explains: “Over the past twelve months, we’ve screened hundreds of marketing candidates and have seen a direct impact of artificial intelligence on entry-level positions. Approximately 20% of ads for junior copywriters and content managers have disappeared from

Nvidia CEO: “The gap with China is just a few nanoseconds.”

On September 25, during the interview program Bg2 Pod , Nvidia CEO Jen-Hsun Huang expressed positions that fueled heated public debate. During his speech, Huang defended the Chinese economic system, praised the “996” work culture, and called the so-called “China hawks” not a title of honor, but a “mark of shame.” Relationship between the United States and China Huang recalled having previously convinced Donald Trump to lift the ban on the sale of Nvidia H20 chips to China, but in exchange for a 15% export tax. Today, the situation has changed: Beijing has responded to US restrictions with a ban on the

Microsoft launches Agent Mode in Excel and Word! Fewer formulas and more artificial intelligence.

Microsoft has launched Agent Mode, an AI-powered feature in Excel and Word that automatically creates complex spreadsheets and text documents with a single text query. Copilot Chat also launched Office Agent, powered by Anthropic templates, which allows users to quickly create PowerPoint presentations and Word documents. Agent mode in Excel and Word is a more powerful version of the Copilot assistant already present in the Office suite. One of the agent’s tasks is to make complex Excel functions accessible to users. The AI agent is based on the OpenAI GPT-5 model. When presented with a complex task, it breaks it down into

Goodbye, real-life stars? Here comes Tilly Norwood, the first AI actress!

In an industry once dominated by live-action stars, digital characters are increasingly gaining traction. At a summit in Zurich, actress, comedian, and technologist Ellin van der Velden announced that her AI agency, Xicoia, is in talks with several major agents to sign its first virtual talent: an AI actress named Tilly Norwood. Ellin van der Velden presented her initiative at a panel dedicated to artificial intelligence in the entertainment industry. She described her AI production studio Particle6 , which later evolved into Xicoia , an agency specializing in the creation, management, and monetization of “hyperrealistic digital stars.” Tilly Norwood is the first

LockBit 5.0 — the cross-platform ransomware that targets hypervisors

In September 2025, a new incarnation of the notorious LockBit ransomware emerged, dubbed LockBit 5.0. It’s not just an “update”: it’s an operational adaptation designed to be faster, less noisy, and have a greater impact on virtualized infrastructures. The feature that should be emphasized right away is that 5.0 is cross-platform: samples have been identified for Windows, Linux, and VMware ESXi—which expands the attack surface and requires coordination between different teams (endpoints, servers, virtualization). What changes The attack chain remains the same, but LockBit 5.0 carries it forward faster and with measures designed to minimize traces: The image shows the parameters, and

From user to root in a second! CISA warns: millions of operating systems at risk. Patch!

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical vulnerability in the popular Sudo utility, used on Linux and Unix-like systems, to its catalog of currently exploitable vulnerabilities (KEVs). The bug is filed as CVE-2025-32463 and has a CVSS score of 9.3 . It affects Sudo versions prior to 1.9.17p1 and allows a local user, via the -R (–chroot) option, to execute arbitrary commands as root, even if their execution is not specified in the sudoers configuration. The issue was first reported by Stratascale researcher Rich Mirch in late June 2025. While the exact exploitation of the vulnerability and

HarmonyOS: 1 billion devices and a growing open-source ecosystem

The Open Source Hongmeng Technology Conference 2025, recently held in Changsha, highlighted the achievements of HarmonyOS ” Hongmeng ” (鸿蒙), the open source operating system developed by Huawei. Richard Yu, Huawei Executive Director and President of Device BG, said in a video message: “Over the past five years, with the support of the Open Atom Open Source Foundation, industry, academia, and research have collaborated to develop HarmonyOS as an open source project, creating a true miracle in the history of Chinese software development.” According to the latest data, the HarmonyOS open source community has over 9,200 contributors and more than 130 million