Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Fortinet 320x100px
Crowdstriker 970×120

Category: Cybercrime and Darknet

Will Nvidia’s robotic brain revolutionize artificial intelligence and robotics?

On August 24, the official Nvidia Robotics account shared an image on social media of a black gift box accompanied by a greeting card signed by founder Jensen Huang, with the caption “Enjoy.” The announcement anticipated the launch of a new robot “brain,” suggesting a significant shift in the company’s robotics strategy. In the presentation video, a humanoid robot from Chinese manufacturer Fourier picks up the greeting card and begins reading it, while opening the package reveals different types of arms. This detail suggests that the new brain could be compatible with multiple humanoid robot models, increasing the system’s versatility. In recent

Qilin leads ransomware attacks as new groups emerge underground

Qilin continues to lead the way among all active crypto attack groups, significantly lagging behind its competitors in the number of reported incidents. According to a recent Cyble report, the group attacked 104 organizations in August alone, while its closest rival, Akira, only affected 56 victims. Nonetheless, new actors have emerged, whose rapid activity could dramatically shift the balance of power in the ransomware landscape in the near future. The total number of attacks recorded in August reached 467, marking the fourth consecutive month of such growth. of incidents. The peak recorded in February remains unsurpassed. Particularly alarming is the growing trend

RevengeHotels Improves VenomRAT with Artificial Intelligence

Kaspersky Lab experts have detected a new wave of attacks by the RevengeHotels group. A distinctive feature of this campaign is that many of the new malware samples were created using artificial intelligence. RevengeHotels (also known as TA558) has been active since 2015 and specializes in stealing credit card data from hotel guests and travelers. Criminal hackers typically send emails with phishing links that redirect visitors to websites disguised as document storage sites. These websites download malicious scripts that infect the targeted computers. The final payloads are various remote access trojans (RATs) that allow attackers to control compromised systems, steal sensitive data,

Security Alert: Vulnerability in Ivanti Endpoint Manager Mobile. CISA Warns

The U.S. Cybersecurity Agency (CISA) has issued an alert regarding two malware kits discovered on the network of an unidentified organization after exploiting new vulnerabilities in the Ivanti Endpoint Manager Mobile (EPMM) mobile device management system. Attackers exploited the CVE-2025-4427 and CVE-2025-4428 vulnerabilities, both of which were used in zero-day attacks before the release of Ivanti updates in May. 2025. The first vulnerability allows authentication bypass and access to protected resources, while the second allows remote code execution. Together, they allow the unauthorized execution of arbitrary commands on the vulnerable EPMM server. CISA notes that the attack began around May 15, 2025,

Root in less than two minutes: How Phoenix exploits vulnerabilities in DDR5 module TRRs.

Anew variant of Rowhammer attacks has been developed that can bypass the latest security mechanisms in SK Hynix DDR5 chips. Dubbed Phoenix, the attack allows root access to DDR5-based systems in less than two minutes. Recall that the original Rowhammer attack was devised by experts at Carnegie Mellon University in 2014. Its essence lies in the fact that intense manipulation of some memory cells can cause a change in the state of bits in adjacent cells. Memory cells store information in the form of electrical charges, which determine the value of the bits within them, i.e., 1 or 0. Due to the

China kicks off the race for innovation with its first AI competition

The city of Karamay, Xinjiang, hosted the opening of the finals and exhibition of the first AI Applications Competition. The event, held at the Museum of Science and Technology, saw twenty-four projects compete for the final prizes in nine key areas, from healthcare to industrial energy to education. The event also included an exhibition of results, the signing of agreements, and an awards ceremony, aiming to highlight the role of AI in local development and the construction of a “city of computational power.” The competition, titled “Walking with Digitalization, Empowering Development,” was organized by the Karamay Municipal Party Committee and Administration, together

A major cyberattack hits European airports. Flights grounded.

On Saturday, September 20, 2025, a cyberattack hit a service provider used by several European airports, including Brussels, Berlin, and London Heathrow. The incident caused significant disruption, with flight delays and cancellations. https://www.redhotcyber.com/post/attacco-informatico-colpisce-gli-aeroporti-europei/The company involved, Collins Aerospace, announced that it is experiencing international technical issues affecting its airport management systems. The company has assured that its technicians are working to restore the situation to normal. “Collins Aerospace is working to quickly resolve the issue,” reads the official statement published on Heathrow’s social media channels. At Heathrow, airport authorities have advised travelers to check the status of their flights before leaving home and

Submarine Cables: Japan Declares War on Chinese Suppliers

After the United States decided to restrict access to undersea communications cables using Chinese technology, Japan also initiated a plan to inspect its own connections. The investigation aims to verify whether key components from China were used in the installation and maintenance of the infrastructure. According to Nikkei Asia, the audit will be completed by March 2026 and will cover cables, repeaters, and control systems. If the use of Chinese suppliers is confirmed, the Japanese government will encourage companies to turn to other markets, evaluating possible subsidies to cover the higher costs. The global submarine cable market is dominated by SubCom (United

A social network made entirely of bots! The University of Amsterdam experiment

Researchers at the University of Amsterdam conducted a novel experiment, creating a social network populated exclusively by artificial intelligence bots. The primary objective was to analyze how digital dynamics could be influenced by different moderation measures. The underlying idea was to test the effectiveness of tools capable of reducing two of the most serious problems of contemporary social media : polarization and toxicity in online interactions. To this end, six different strategies were tested. These included switching to a chronological feed, increasing the visibility of dissenting opinions, hiding subscriber statistics, and removing profile descriptions. For example, sorting the news feed chronologically reduced

DeepSeek under fire: 50% of malicious code produced on sensitive queries

Specialists at CrowdStrike conducted a series of experiments with the Chinese artificial intelligence system DeepSeek, testing its code generation based on query terms. They found that the results directly depended on the identity of the customer or associated organization. If the queries included neutral scenarios or mentioned the United States, the model produced clean, well-structured, and attack-resistant code. However, as soon as the project was linked to topics that provoked a negative reaction from the Chinese government, the quality of the solutions declined dramatically. The most notable examples involved queries from Falun Gong practitioners and organizations that mentioned Tibet, Taiwan, or the