Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Enterprise BusinessLog 320x200 1
Banner Desktop

Category: Cybercrime and Darknet

PureVPN on Linux: Researcher Finds Security and Anonymity Issues

An independent researcher named Andreas, who runs the blog Anagogistis , has discovered serious vulnerabilities in Pure VPN’s Linux clients that compromise basic anonymity and traffic security. The issues affect both the graphical (2.10.0) and console (2.0.1) versions. Both were tested on Ubuntu 24.04.3 LTS. The main vulnerability arises because when reconnecting to Wi-Fi or waking the system from sleep mode, the user’s true IPv6 address becomes visible. In the console client with the Internet Kill Switch feature enabled, the service automatically reports the connection resumption, but during this time the system receives IPv6 routes via Router Advertisement, causing packets to bypass

Ally Solos AI Glasses for the Visually Impaired: Autonomy and Safety

Envision’s Ally Solos AI glasses are a breath of fresh air for people with visual impairments, helping them read , orient themselves and understand their surroundings without the constant assistance of others. The built-in camera captures text and scenes around the user, and artificial intelligence instantly reads aloud menus, street signs, documents, and even handwritten notes. This allows you to independently familiarize yourself with bus schedules, choose dishes at a restaurant, or consult documents without needing external assistance. Ally Solos glasses can do much more than read. They can describe what’s happening nearby, identify objects by color, point out landmarks, and recognize

When Unicode Becomes a Weapon and Your Email Betrays You, Inboxfuscation Arrives

Attackers are increasingly using Microsoft Exchange inbox capabilities to ensure persistence and steal sensitive information within corporate networks. Inboxfuscation , developed by Permiso, is a framework that demonstrates how attackers can weaponize Exchange’s rules engine, creating stealthy persistence mechanisms that evade both human review and code-based detection. Inboxfuscation uses Unicode-based obfuscation techniques to generate malicious inbox rules that bypass traditional security systems. In the past, malicious inbox patterns were often easy to spot : obvious keywords paired with actions like deleting or forwarding messages to attacker-controlled inboxes. Traditional security tools relied on keyword- and regular expression-based detection, strategies that were effective against

Scattered Spider: The teenage genius who hacked Las Vegas is in custody.

A series of high-profile attacks on the Las Vegas gambling industry in 2023 has now reached its final phase. Several major casinos have been victims of sophisticated network intrusions. The group responsible was Scattered Spider (Octo Tempest, UNC3944, 0ktapus), which at the time actively used social engineering techniques and accessed internal company systems. The scope of the attacks was so serious that the investigation was immediately transferred to a joint FBI cyber team in Las Vegas and the Las Vegas Police Department’s cybercrime unit. After a lengthy investigation, detectives identified a specific suspect. It turned out he was a minor whose name

Cyberattacks on European airports: ENISA identifies ransomware

The European Union Agency for Information Security (ENISA) has announced that it has identified the type of ransomware responsible for the serious disruptions that paralyzed several European airports, including Berlin, London, Brussels and Dublin , last weekend. “ENISA,” a statement reads, “is aware of the ongoing disruption to airport operations caused by a third-party ransomware attack. ” Members of the CSIRT network (the network of EU Member States’ national incident response officers) and CyCLONe (the network of Member States’ national authorities responsible for cyber crisis management) are actively exchanging information on the matter, and ENISA is providing support in the form of

First malware with integrated GPT-4 discovered: MalTerminal arrives

SentinelLABS researchers have discovered what they describe as the first known example of malware with integrated LLM functionality , dubbed MalTerminal . The discovery was presented at LABScon 2025 , where a wide array of artifacts was displayed: a Windows binary, several Python scripts, and auxiliary tools demonstrating how GPT-4 has been exploited to dynamically generate malicious code , such as ransomware or reverse shells. The analyzed sample contained an API endpoint referring to the old OpenAI Chat Completions service, which was decommissioned in November 2023. This suggests that MalTerminal was developed before that date, making it an early malware sample with

The winners of the AI race? Electricians and plumbers.

In an interview with Channel 4 News, Nvidia CEO Jensen Huang said that in the race to succeed in the AI era, “the big winners will be electricians and plumbers.” According to the entrepreneur, practical professions will prevail as companies widely implement AI. The Channel 4 report aired against the backdrop of US tech companies’ grand promises to invest £31 billion in Britain. Against this backdrop, Huang explained why “hands-on skills” and certified installation and maintenance skills will be increasingly valued. The interview was recorded by economic commentator Helia Ebrahimi. Juan’s logic easily aligns with his description of today’s data centers: “AI

SonicWall warns customers to change credentials after security breach

SonicWall has warned its customers to change their login credentials as soon as possible. A cyberattack on MySonicWall accounts compromised firewall configuration backup files. SonicWall reports that, after the incident was discovered, the attackers’ access to corporate systems was blocked. The vendor is currently working with cybersecurity agencies and law enforcement to investigate the consequences of the breach. “As part of our commitment to transparency, we are informing you of an incident that resulted in the compromise of firewall configuration backup files stored in certain MySonicWall accounts,” the company said. “Access to the compromised configuration files could significantly facilitate firewall exploitation by

“He doesn’t understand me, but ChatGPT does”: The 21st-century love triangle

The American magazine Futurism has described a new conflict at the intersection of technology and personal life: artificial intelligence bots like ChatGPT are becoming a third party in relationships, often pushing couples toward breakups . In one incident, a ten-year-old boy sent his parents a message saying “please don’t divorce” after yet another argument. The mother didn’t respond, but asked ChatGPT to formulate a response. The family eventually separated. The husband claims his wife spent months in “long, therapeutic conversations” with the bot, rehashing old grudges, while the AI confirmed his innocence and painted him as a “bad guy.” He claims this

Major DarkForums Leak: 196 Italian Sites Exposed with Clear FTP Credentials

On September 20, 2025, at 11:52 PM, a thread titled “FRESH FTP LEAK” appeared on DarkForums , posted by user Hackfut . The material allegedly exposed access to FTP servers distributed across several countries, including Italy , the Netherlands, the Philippines, Peru, Chile, Australia, and Latvia. The targets included companies, schools, hospitality facilities, event sites, e-commerce sites, and media outlets . The dump’s contents consist of hostnames/FTP domains, usernames, and passwords in clear text . Unfortunately, the critical issue for our country is the significant number of Italian domains present within the collection, which is made available free of charge to users