Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
LECS 320x100 1
Banner Desktop

Category: Cybercrime and Darknet

Back to the On-Prem: Austrian Armed Forces Choose LibreOffice

In recent years, many companies have gone cloud-first , outsourcing critical infrastructure and business services to platforms managed by external providers. However, recent events and growing concerns about digital sovereignty are prompting many organizations to reconsider their level of dependence on uncontrollable cloud services within their regions. The vulnerability of critical data and the possibility that external political or commercial decisions could limit access to resources have made it clear that internal management and the choice of open source solutions can represent a more secure strategic alternative. The Austrian Armed Forces have completed a major overhaul of their IT infrastructure, completely abandoning

Digital Crisis Management: Communication Is the Key to Success or Failure

In recent years, cyberattacks have become a major threat to businesses, regardless of industry. While technical departments focus on troubleshooting and restoring systems, the true test of an organization’s ability to communicate clearly and credibly with the public is the organization’s ability to address these issues. In a digital crisis, in fact, reputation risks suffering damage that is often more severe than the economic losses resulting from the attack itself. Reputation, a fragile asset The trust of customers, partners, and even employees is an intangible asset that is built over time and can be compromised in a matter of hours. It’s not

Balancing speed and security! This is the real challenge of Vibe Coding.

The cybersecurity industry is undergoing a transformation: artificial intelligence is becoming not just a tool for developers, but also a weapon for attackers. And we’ve talked about this extensively. This concept was brought to the attention of Ami Luttwak, CTO of Wiz, explaining that new technologies inevitably expand the attack surface and that integrating AI into business processes accelerates both the development and the emergence of vulnerabilities. According to Luttwak, accelerating development through vibe coding and integrating AI agents often leads to bugs in core mechanisms, such as the authentication system. This is because the agents perform their assigned tasks literally and

TOR Anonymizer v3.0: Advanced Digital Privacy Protection

In a digital landscape increasingly characterized by mass surveillance and indiscriminate data collection, the pursuit of online anonymity has become a primary necessity for journalists, activists, and researchers. It is in this context that TOR Anonymizer v3.0 emerges, a tool that represents a significant leap forward in digital privacy protection. The real strength of TOR Anonymizer v3.0 lies in its advanced route management within the Tor network . Unlike a traditional client, which simply creates basic connections, this tool introduces an advanced system capable of building multi-hop connections with strategically chosen nodes, thus strengthening anonymity. Entry guards are kept stable to reduce

Three serious vulnerabilities discovered in VMware vCenter and NSX: apply patches immediately.

On September 29, 2025, Broadcom released security advisory VMSA-2025-0016 , addressing three vulnerabilities identified in VMware vCenter and VMware NSX products. The bugs affect several solutions in the VMware ecosystem and have a severity rating of High , with a CVSSv3 score between 7.5 and 8.5 . The vulnerabilities affect the following components and platforms: Vulnerability Details The identified vulnerabilities are classified as CVE-2025-41250, CVE-2025-41251 and CVE-2025-41252 . CVE-2025-41250 – SMTP Header Injection in vCenter A weakness in VMware vCenter allows SMTP header injection. A user with non-administrative privileges, but authorized to create scheduled tasks, could manipulate notification emails sent by the

0-day 0-click WhatsApp! All it takes is one image to take control of your iPhone.

Some spyware producer is probably doing gymnastics… tearing their hair out. But it’s the usual charade: someone finds, someone cashes in, someone integrates, and then the researcher on duty comes along to ruin the party—for ethics or some other theatrical reason. A security flaw was recently discovered in WhatsApp that allows zero-click remote code execution (RCE). This vulnerability is already being actively exploited by attackers on Apple platforms, including iOS, macOS, and iPadOS. Researchers at DarkNavyOrg have discovered a flaw by exploiting two vulnerabilities, CVE-2025-55177 and CVE-2025-43300, in a proof-of-concept. This weakness allows devices to be compromised silently, without requiring any user

Computer science graduates with no future! Thousands of resumes ignored, and goodbye to six-figure salaries.

Alarming trends are emerging in the IT job market. More and more computer science graduates are unable to find work, even at minimum wage. A computer science degree was once considered a gateway to a well-paying career with rapid advancement . But mass layoffs at major tech companies, coupled with the introduction of new tools that eliminate the need for in-depth technical knowledge, have radically changed the rules of the game. The stories of young professionals are disheartening. A University of Oregon graduate said he sent out nearly six thousand resumes and had thirteen interviews in two years, without ever receiving a

The US wants to hack Telegram! The case sparks debate over privacy and jurisdiction.

The U.S. Department of Justice has received court authorization to conduct a remote inspection of Telegram’s servers as part of an investigation into child exploitation. The prosecutor’s motion stated that this measure was necessary due to the company’s refusal to cooperate with law enforcement and respond to official inquiries. The judge granted permission to use a specialized remote access technique that allows a series of requests to be sent to Telegram servers. These requests force the system to return information about the target account, including messages and associated data. The decision was reported by CourtWatch , citing court documents; however, direct links

As Windows 10 retires, Windows 7 installs double in two months

Windows 7 was one of Microsoft’s best operating systems, and many still praise its stability today . But Microsoft discontinued support for this operating system marvel in January 2020. According to Statcounter statistics updated to September 2025, the long-discontinued Windows 7 operating system has doubled its market share among Microsoft operating systems in the last two months. Meanwhile, Windows 11’s market share has grown significantly, driven by new PC purchases and migrations from the previous Windows 10 operating system, which ends support in October 2025. According to StatCounter, Windows 11’s global market share surpassed that of Windows 10 in July 2025. In

Bill Gates: Programmers are not at risk! AI is a tool, not a competitor.

Artificial intelligence is rapidly changing traditional professions. Just yesterday, we reported that the demand for software engineers has dropped 71% in the last three years. But according to Bill Gates , there are jobs that machines won’t be able to replace even in a hundred years. And he’s not referring to doctors or artists, but to programmers. In a discussion on the future of technology, Gates acknowledged his shared concerns: the development of artificial intelligence is both exciting and terrifying. The World Economic Forum predicts that automation could eliminate approximately 85 million jobs by 2030 , but create up to 97 million