Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Enterprise BusinessLog 320x200 1
970x20 Itcentric

Category: Cybercrime and Darknet

ADC Aerospace Hit by Play Ransomware Attack, Data Breach Feared

American aviation and defense components manufacturer ADC Aerospace has found itself in the spotlight due to a possible cyber attack by the Play ransomware group, which appeared on their blog where criminal hackers claim to have compromised company data and customer documents. Disclaimer: This report includes screenshots and/or text from publicly available sources. The information provided is for threat intelligence and cybersecurity risk awareness purposes only. Red Hot Cyber condemns any unauthorized access, improper dissemination, or misuse of this data. It is currently not possible to independently verify the authenticity of the information reported, as the organization involved has not yet released

Microsoft 365 Security Risk: Interface Poisoning Attacks

This article analyzes the disclosure submitted to Microsoft and available in English on digitaldefense , where images, demonstration videos and a Python code example are available. In recent years, digital communications security has amplified a certain paradigm: attacks no longer aim simply to violate the infrastructure, but to dismantle user trust by exploiting every type of cognitive hook. If email, calendars, and collaboration platforms represent the center of gravity of corporate life, the most effective attack surface is not the purely technical one, but the one capable of impacting the human factor. The phenomenon analyzed in this article certainly doesn’t concern marginal

Calendar Subscriptions: A Hidden Danger in Your Digital Life

Digital calendars have long been a convenient way to keep track of daily activities, but new research from Bitsight shows that this familiar tool can become a real attack channel. Bitsight researchers discovered over 390 abandoned domains associated with iCalendar sync , which received daily requests from approximately 4 million iOS and macOS devices. Anyone who re-registers these domains gains the ability to stealthily add events to users’ calendars, complete with links, files, and any other content. The problem is that third-party calendar subscriptions are typically created with a single click, for holidays, event calendars, discounts, or app reminders . But this

Airbus A320 Recall Due to ELAC System Failure Caused by Solar Flares

Airbus has announced the recall of approximately 6,500 A320 aircraft due to potential failures in the ELAC control system caused by powerful solar flares. The recall followed a sudden loss of altitude during a flight from Cancun, Mexico, to Newark, which resulted in an emergency landing and 15 injuries to passengers. According to Reuters , the decision to recall the aircraft was made following an investigation into the JetBlue A320 crash. The investigation determined that the crash was caused by the ELAC subsystem’s incorrect response to intense solar flares. As a result, the system misinterpreted the movements of the control column .

OpenAI Faces Fierce Competition from Google’s Gemini 3

OpenAI, a company valued at around $500 billion, is facing increasingly fierce technical competition . Google’s latest version of Gemini 3 , in particular, outperforms OpenAI’s GPT-5 in several areas. “The world today is profoundly different from the situation two years ago, when OpenAI was ahead of everyone else,” Thomas Wolf, co-founder and chief scientific officer of the artificial intelligence platform Hugging Face, told the Financial Times . OpenAI CEO Sam Altman himself recently admitted in a leaked memo to staff that the company must prepare for a period of intense competition. Just a year ago, Google’s position seemed less favorable, but

Leonardo’s Michelangelo Dome: AI-Powered Defense Against Hypersonic Threats

Italian defense company Leonardo has unveiled its new Michelangelo Dome system . According to the company, it is designed to counter hypersonic missiles and mass drone attacks . During the technical presentation to the Italian Minister of Defense and Chiefs of Staff, CEO Roberto Cingolani announced plans to begin deployment as early as 2026 and reach full operational capability by 2028. The name says it all, and the resemblance to Israel’s famous Iron Dome is clearly intentional. The Israeli system, operational since 2011, served as a model. But Michelangelo Dome goes much further: it is not conceived as a single weapons system,

Windows 11 Password Issue: Microsoft Warns of Invisible Icon Bug

Microsoft has warned users of a Windows 11 glitch: after the release of updates starting in August 2025 , the password-based sign-in button may disappear from the lock screen. While the feature itself still works, the icon simply becomes invisible. As Microsoft explained in its updated guide, the issue affects devices with multiple sign-in methods enabled: PIN, security key, password, fingerprint, etc. Hovering your mouse over the icon’s previous location displays an invisible hotspot . Clicking it opens the password entry field. There are currently no workarounds other than relying on your intuition. Microsoft has stated that it is working on a

CISA Warns of OpenPLC ScadaBR Vulnerability Exploitation

The Cybersecurity and Infrastructure Security Agency (CISA) has expanded its list of exploited vulnerabilities (KEVs), reporting a new vulnerability affecting OpenPLC ScadaBR , due to ongoing active exploitation indications. This security flaw, identified as CVE-2021-26829 with a CVSS score of 5.4, affects Windows and Linux versions of the software due to a cross-site scripting (XSS) vulnerability in the system_settings.shtm page. Just over a month after Forescout reported that a pro-Russian hacktivist group known as TwoNet had targeted its honeypot in September 2025, mistaking it for a water treatment plant, the security flaw was added to the KEV catalog. Affected versions include: “The

The Power of A* Algorithm in Artificial Intelligence and Robotics

Nearly everything artificial intelligence does today is based on a simple but fundamental idea: any problem can be reduced to finding a path from a starting point to a goal. The computer considers several states, evaluates which are closest to the result, and proceeds in sequence until it finds a solution. The most obvious comparison is navigation. When a person plots a route on the London Underground, say from Bond Street to King’s Cross, they mentally consider the options: the Central Line to Oxford Circus, a transfer to the Victoria Line, Warren Street, Euston, and finally the final destination. A computer does