Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Banner Ransomfeed 320x100 1
TM RedHotCyber 970x120 042543

Category: Cybercrime and Darknet

TikTok, the app setting the US ablaze: billion-dollar deal for total control

TikTok’s fate in the United States is now inextricably linked to political negotiations. The White House has announced that the service’s recommendation algorithm will be replicated and adapted solely based on data provided by users residing in the United States. Oracle will be responsible for reviewing and managing this system , while a new company, funded by American investors, will be responsible for managing the app. This decision is part of a broader agreement to avert a ban on TikTok in the United States, should the Chinese company ByteDance refuse to relinquish ownership of the app. According to Donald Trump administration officials,

Supply Chain: The blockade of European airports raises concerns about an increasingly critical issue.

On September 20, 2025, a cyberattack hit three of Europe’s major airports: London Heathrow, Brussels, and Berlin. The digital systems governing check-in and baggage handling were rendered unusable, resulting in delays, cancellations, and the inability to ensure regular flight traffic. For days, thousands of passengers were trapped in chaos that highlighted how dependent air travel is on the continued functioning of computer systems. The heart of vulnerability in the supply chain The cause should not be found in individual airports, but in Collins Aerospace, a US company belonging to the RTX Corporation group that provides critical software globally. The attack targeted MUSE,

Dedigitalization: Japanese city of Toyoda restricts smartphone use

In the Japanese city of Toyoda (Aichi Prefecture), city council members approved a draft ordinance limiting smartphone use during leisure time . The document establishes a daily limit of two hours, with exceptions for work or school activities . Twelve of the 19 city council members supported the measure. The new rules will take effect on October 1st. As NHK points out , the regulation does not include penalties and is advisory in nature. Authorities hope it will help raise awareness among city residents about the problem of excessive screen time. The city administration emphasizes that smartphones have become a necessary part

ShadowV2: New MaaS botnet for DDoS attacks uses containers

Amid growing criminal activity, Darktrace has uncovered a new campaign using the ShadowV2 botnet. Researchers detected malicious activity on June 24, 2025, when their honeypots were activated. This system relies on a Trojan horse written in Go that turns compromised Amazon Web Services cloud containers into fully-fledged nodes for DDoS attacks. ShadowV2 is unique in that it exploits vulnerable Docker instances running on AWS EC2 virtual machines . The first step in the infection is the deployment of a helper container based on an Ubuntu image, which automatically installs the necessary tools. Next, a separate container is created with a pre-compiled ELF

GitHub strengthens npm security against supply chain attacks.

GitHub has announced major changes to its npm authentication and publishing system, aimed at strengthening protection against supply chain attacks. The updates were prompted by the recent Shai-Hulud campaign, a malicious, self-propagating worm embedded in hundreds of npm libraries. Not only did it replicate itself in other packages, but it also scanned developers’ devices for sensitive data, including keys and tokens, and transmitted it to attackers. In response to the incident, GitHub announced that it would soon eliminate legacy permission mechanisms and introduce stricter controls. Key changes include mandatory two-factor authentication for local publishing and the move to short-lived tokens with a

Towards AGI: Google DeepMind warns, AI could ignore humans

Google DeepMind researchers have released an updated version of their AI risk assessment framework, Frontier Safety Framework 3.0 . This paper examines how generative models can run amok and pose a threat . It considers scenarios in which the AI ignores users’ attempts to stop it. DeepMind’s approach is based on so-called “Critical Capability Levels” (CCLs) . This is a scale for assessing the point at which a model’s behavior becomes dangerous, for example in cybersecurity or biotechnology. The document describes the steps developers should take when their systems reach a certain level of risk. The researchers cite the model’s potential for

From Debugging to Breaking: Turning Crash Dumps into EDR Kill Switches

I have been working for several years as a System Engineer, and one of the tasks I handled was managing Citrix PVS. One of the issues with PVS was investigating dump files. The only way to generate a complete dump file was by using the DedicatedDumpFile option, which is available as a registry key under HKLMSYSTEMCurrentControlSetControlCrashControl. A significant obstacle when the DedicatedDumpFile is enabled and configured is deleting it, because it is always in use by a process. The crash dump is created by the Windows kernel (ntoskrnl.exe) in cooperation with the Crashdmp.sys driver. To guarantee that the file is always contiguous,

RAN Hacking: US Intelligence Uncovers Clandestine Cellular Network in New York

U.S. intelligence agencies have reported discovering and seizing a network of telecommunications equipment in the New York area capable of disrupting mobile phone service. The devices were located near the United Nations General Assembly , which was attended this week by dozens of world leaders. According to the agency, the network included more than 100,000 SIM cards and approximately 300 servers . The equipment allowed the sending of anonymous encrypted messages and could interfere with emergency services . According to one official, the system was capable of sending up to 30 million text messages per minute and the Secret Service had never

Chrome for Android: From a “wall of text” to a podcast is a short step.

Google has added a new AI-powered feature to Chrome for Android for reading web pages. Instead of reading the entire text aloud, the browser can summarize the material in a “podcast” format : two synthesized speakers discuss key points, turning a long article into a short, lively audio. Early users noticed the new feature in the stable build of Chrome 140.0.7339.124, so it looks like the feature is gradually rolling out to a wider audience. You can enable voiceover the same way: open a page, click the three dots in the upper right corner, and select “Listen to this page.” A new

Developers safe: Mozilla introduces Firefox extension rollback feature.

Mozilla has introduced a new feature for Firefox add-on developers that allows them to quickly revert to a previously approved version and fix critical issues in situations where fixing and revalidating the extension would take too long. The new logic allows users to make a recent update unavailable for installation, and if automatic updates are enabled, the browser will automatically roll back the extension to the previous build within 24 hours for users who have already installed the affected version. Rollbacks are performed by republishing the old build with a new release number and distributing it via the Developer Hub or the