Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
LECS 320x100 1
TM RedHotCyber 970x120 042543

Category: Cybercrime and Darknet

Happy birthday, Windows! 40 years of operating system history and still going strong.

Exactly 40 years ago, on November 20, 1985, Microsoft released Windows 1.0 , the first version of Windows, which attempted to transform the then-personal computer from a machine with a monotonous command line into a system with windows, icons, and mouse control . This is the groundbreaking of some of the greatest innovations of our time, conceived by the genius of Douglas Engelbart and the “oN-Line System” , the system designed in the sixties that introduced a window operating system connected to a mouse, presented in the historic “mother of all demos” of December 9, 1968. To today’s audiences, this may seem

World Children’s Day: Children live in digital, but digital wasn’t designed for them.

Today is World Children’s Day, established by the UN on November 20 to commemorate two fundamental acts: the 1959 Declaration of the Rights of the Child and, thirty years later, the 1989 Convention on the Rights of the Child. An event that, every year, risks becoming a ritual gesture, a sterile reminder of the “right to the future.” Yet the present tells us that true fragility lies not in the future, but in the way children live today: in a digital ecosystem that wasn’t designed for them, fails to protect them, and exposes them to risks that no longer resemble anything we

Huawei unveils HarmonyOS and the new HM740 laptop. Is Microsoft Office at risk?

On November 19, Huawei presented the latest developments in its HarmonyOS line for the office sector during a technical meeting with institutional partners and enterprises. The company confirmed that HarmonyOS-based PCs have achieved full supply chain autonomy and introduced two significant innovations: the launch of the HarmonyOS Enterprise Edition beta phase and the imminent arrival of the Huawei HM740 commercial laptop. The event, opened by a speech by Zhu Dongdong, president of Huawei’s tablet and PC division, highlighted the group’s desire to accelerate the adoption of the operating system in the professional sector. According to Zhu, the development work conducted in recent

Meta and Google suspend construction of two undersea cables due to instability in the Red Sea

Meta and Google have been forced to postpone several major undersea internet cable projects, including 2Africa and Blue-Raman , in the Red Sea corridor through which 20 percent of global internet traffic flows, due to increased security risks. This delay has forced companies to resort to more expensive alternatives and highlighted how geopolitical instability threatens the global digital infrastructure. The race to build next-generation internet infrastructure has hit a major hurdle on one of the world’s most important shipping lanes. Meta and Google have confirmed that their strategic fiber optic cable project across the Red Sea has been suspended, primarily due to

Let the hunt begin! Critical 7-Zip bug puts millions of users at risk.

Millions of users are exposed to the risk of malware infections and system compromise due to hackers’ active exploitation of a critical remote code execution (RCE) vulnerability in the popular 7-Zip archiving software. Disclosed in October 2025, this vulnerability has a CVSS v3 score of 7.0, and shows a severity of local exploitation, but at a large scale without requiring elevated privileges. Specifically, CVE-2025-11001 is a security flaw involving the improper handling of symbolic links within ZIP archives. This allows attackers to execute arbitrary code on vulnerable systems by navigating through directories. On November 18, 2025, the UK’s NHS England Digital issued

Python to Rust: A More Secure Future for the Programming Language

Two CPython developers have proposed adding the Rust programming language to the Python codebase . Emma Smith and a colleague have published a Preliminary Python Enhancement Proposal (Pre-PEP) justifying this step. Currently, Rust is only intended for writing optional extension modules, but it may become a required dependency in the future. The main reason for adopting Rust is to improve memory safety . The language prevents entire classes of compile-time errors: out-of-bounds array accesses, accesses to freed memory, and data conflicts in multithreaded code. This is especially relevant for Python, which uses free threads, where thread safety is paramount. The RustBelt project

Multi-threaded Hacking: US Pioneers Automated Operations with AI Agents

In recent months, a new cyber operations infrastructure has been developing in the United States, in which automated agents are becoming not just a support tool, but a full-fledged participant in offensive operations . Amid competition with China over autonomous systems capabilities, Washington is investing heavily in research that expands the scope of attacks and reduces preparation times, focusing on the concept of multi-threaded hacking based on artificial intelligence. One of the centers of this initiative is the little-known company Twenty , based in Arlington , which has received several contracts from U.S. military agencies. The company, which has not yet formally

WhatsApp data leak: 3.5 billion numbers “stolen” by researchers at the University of Vienna

The scale of the leak, described by a team from the University of Vienna , demonstrates how dangerous the familiar contact search function of popular messaging apps can be. WhatsApp has always emphasized the ease of adding new people: simply enter a phone number into your address book, and the service instantly reveals whether the person is registered on the app, revealing their name, photo, and partial profile . However, this simplicity has become the basis for one of the largest collections of user data in history, and all of this has happened without hacking or circumventing technical barriers. Austrian researchers decided

Google launches Gemini 3, its most advanced artificial intelligence model

Google has announced the launch of Gemini 3, the next generation of its flagship artificial intelligence model, which the company is integrating into search, the Gemini app, cloud services, and developer tools. Google management calls Gemini 3 the smartest model in its lineup and the next step toward artificial general intelligence (AGI). Nearly two years ago, the company launched the so-called Gemini era , and since then, the scale of AI adoption has grown significantly. According to Google, AI Overview mode in search now reaches approximately 2 billion monthly users, the Gemini app is reaching 650 million monthly active users, over 70%

CISA’s ‘Secure by Design’ Pledge: A Year of Progress in Cybersecurity

By Carl Windsor, Chief Information Security Officer at Fortinet Secure-by-design practices represent a fundamental shift in software development: security is no longer considered an afterthought, but is integrated from the ground up, into the very DNA of the product. This philosophy is widely recognized as a best practice in the industry, but it is not yet mandatory, nor is it uniformly applied, nor is it fully understood by customers. However, adopting a secure-by-design approach is increasingly crucial, as digital infrastructures face an unprecedented speed and volume of sophisticated threats. Cybercriminals, both inexperienced and highly skilled, are leveraging new resources—from purchasing exploit kits