Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Redhotcyber Banner Sito 320x100px Uscita 101125
TM RedHotCyber 970x120 042543

Category: Cybercrime and Darknet

From Leash to Autonomy: Ban, Nvidia Block, and Huawei’s AI Cluster Solutions

China’s Huawei has taken a major step in developing its own artificial intelligence infrastructure. The company has unveiled solutions designed to increase computing power and reduce dependence on foreign technologies . This move is particularly significant after Chinese regulators imposed restrictions on local companies’ purchases of Nvidia AI accelerators . Huawei is now focusing on its own developments and new chip-fusion techniques. The key announcement was the SuperPoD Interconnect technology, which enables the integration of up to 15,000 accelerators, including Huawei’s proprietary Ascend chips. This solution is reminiscent of Nvidia’s NVLink system, which enables high-speed communication between AI chips. Essentially, it creates

Discipline your email first so you don’t regret it later

Managing employee email inboxes is often overlooked by organizations, despite the widespread use of email and its significant impact on privacy and security . Despite being a work tool, an individual email inbox (and therefore, assigned to a single operator) is considered the employee’s digital home and, therefore, requires reasonable protection to safeguard the rights, fundamental freedoms, and dignity of the data subjects involved in the exchange of communications (both the account holder and third parties). This complexity, recognized not only by case law but also by supervisory authorities with regard to applicable data protection legislation, therefore requires particular attention in coordinating

Mathematical Security: From Number Theory to Hacking and Pentesting

When we talk about cybersecurity, we immediately think of firewalls, malware, and zero-day exploits. But there’s a deeper level, unseen and unsurpassed: the laws of mathematics. Because while software can be hacked, protocols can be bypassed, configurations can be messed up, mathematics cannot be corrupted. And it is precisely on this pillar that modern cybersecurity is based. Because safety is (also) mathematics Every digital defense technology works not because “someone programmed it well,” but because it exploits mathematical problems that have no efficient solution. Here are some concrete examples: RSA: It is based on the difficulty of factoring numbers of hundreds of

Elon Musk unveils Colossus II, the one-gigawatt AI supercomputer

Elon Musk shared a photo of the complex housing Colossus II, the world’s first gigawatt-scale AI cluster. Elon Musk has previously stated that the Colossus 2 supercomputer, developed by xAI, will become the world’s first gigawatt-scale computing center for AI training. The system, designed to power the Grok chatbot and other AI projects, will use 550,000 Nvidia GPUs, including GB200 and GB300 chips . “Our goal is to get as close to the absolute truth as possible,” Elon Musk said, emphasizing that Grok should provide the most accurate answers possible. Elon Musk previously announced that xAI was currently training its Grok model

Vulnerability in Windows RPC protocol: Spoofing and impersonation attacks reported

SafeBreach experts have disclosed details of a vulnerability in the Windows Remote Procedure Call (RPC) protocol, patched by Microsoft in the July 2025 update. The flaw, CVE-2025-49760, allowed an attacker to conduct spoofing attacks and impersonate a legitimate server using the Windows storage mechanism. Ron Ben Yizak discussed the discovery at the DEF CON 33 conference. The RPC protocol relies on unique interface identifiers (UUIDs) and the Endpoint Mapper (EPM) service, which maps client requests to the dynamic endpoints of registered servers. The vulnerability opened the way to a so-called EPM poisoning attack , in which an unprivileged user could register an

Bandiera turchia

Patchwork Launches Spear-Phishing Campaign Against Turkish Defense

The Patchwork group, also known by the aliases APT-C-09, APT-Q-36, Chinastrats, Dropping Elephant, Operation Hangover, Quilted Tiger, and Zinc Emerson , has launched a new spear-phishing campaign targeting the Turkish defense sector. The attackers’ primary goal, according to analysts, was to obtain sensitive information on developments in unmanned platforms and hypersonic weapons. According to Arctic Wolf Labs , the attack chain consists of five stages and begins with the distribution of LNK (Windows shortcut) files disguised as invitations to an international conference on unmanned vehicles. These emails were addressed to employees of companies operating in the Turkish military-industrial complex , including a

Hackers don’t want to save you: they want to erase you.

Hackers are increasingly targeting backups – not systems or servers, but the data that companies retain for a limited period of time so they can recover from attacks. A new study from Apricorn reveals alarming statistics: one in five data breaches in the UK is directly linked to compromised backups . This indicates that attackers have learned to penetrate deeper and more precisely, precisely where companies hope to find safety in the event of a cyberattack. In the past, backup data was considered a kind of insurance , a reliable and secure copy of critical information that could be restored in the

The Story of Microsoft Solitaire: From Launch with Windows 3.0 to Enduring Success

Microsoft first released Solitaire in 1990 with Windows 3.0, as a tool to familiarize users with the graphical interface and mouse use. The game was created by Wes Cherry, with design assistance from Susan Kare, and has become one of the most widely used software programs in Windows history. Since its introduction, Solitaire has become incredibly popular in offices and schools, so much so that Microsoft has received complaints about lost productivity due to time spent playing it . A well-known story tells of an employee in New York City being fired after Mayor Bloomberg saw the game on his screen. In

Removing private data from AI models? Now you can without accessing the original datasets.

A team from the University of California, Riverside, has demonstrated a new way to remove private and copyrighted data from AI models without accessing the original datasets. The solution addresses the problem of personal and paid content being reproduced almost verbatim in responses, even when the sources are removed or locked behind passwords and paywalls. The approach is called “source-free certified unlearning.” A surrogate set that is statistically similar to the original is used. The model parameters are modified as if it were retrained from scratch. Carefully calculated random noise is introduced to ensure cancellation. The method features a novel noise calibration

Edge vs. Chrome: Microsoft promotes its browser with aggressive ads on Bing

Microsoft has once again launched an aggressive campaign for its proprietary Edge browser. This time, the software giant is displaying a comprehensive comparison table between Edge and Chrome directly on the search page when a user attempts to download Google’s web browser via Bing. According to windowslatest , these ads may appear under certain conditions. For example, the comparison chart is visible to users signed in to a Microsoft account with an active Microsoft 365 subscription and Windows 11 24/7. This could indicate that Microsoft is testing the new ads on a limited number of subscribers. When a user tried to download