Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Crowdstrike 320×100
UtiliaCS 970x120

Category: Cybercrime and Darknet

Hanyuan-1: China’s room-temperature quantum computer challenges the US

China’s first atomic quantum computer has reached a major commercial milestone, recording its first sales to domestic and international customers, according to state media. The Hubei Daily, a state-run newspaper in China’s Hubei province, reported that the first commercial Hanyuan-1 unit It was delivered to a subsidiary of telecommunications provider China Mobile, with an order also placed by Pakistan. Sales were valued at over 40 million yuan (about 5 million euros). Room temperature and mass production The report states that Hanyuan-1 is one of the few machines in the emerging field of atomic quantum computing to have achieved mass production and shipped

Userbox shut down and its admin arrested by Moscow police. Something is changing.

In recent months, it would appear that the Russian Federation is cracking down on cybercrime, a departure from what we were used to seeing in the past , when many cybercriminal groups operated almost undisturbed, often enjoying a sort of tacit protection. Following the arrests of the Medusa Stealer gang by the Russian Interior Ministry a week ago , a new blow was dealt with the detention of the owner of the “ Userbox ” hacking bot in Moscow today. Detention of the owner of the user mailbox The owner of the Userbox hacking bot, also known as User_Search, has been arrested

Will Bug Hunters Be Out of Work? OpenAI Introduces Aardvark, Its New Bug Fixer

OpenAI has unveiled Aardvark, an autonomous assistant based on the GPT-5 model , designed to automatically find and fix vulnerabilities in software code. This AI tool, dubbed a “security research agent,” is already in beta testing and will enable rapid identification and resolution of potential issues in repositories. According to the description, Aardvark monitors source code changes in real time, analyzes commits, and determines which ones might pose a threat. Based on this analysis, the system creates its own threat model, aligned with the project’s architecture and goals. It then analyzes the change history and tests new fragments, attempting to reproduce potential

The Louvre Theft: How Password Governance Can Undermine Security

“When the Key Is ‘Louvre’ – The Theft That Teaches How Password Governance Can Shake Even the Most Violable Fortresses” On October 19, 2025, the Louvre Museum was the scene of a sensational theft: in the famous Galerie d’Apollon, a gang entered through a window using a lifting platform installed on a truck, remained inside for a few minutes, and escaped with at least eight extraordinarily valuable jewels belonging to the French Crown Jewels. Following the event, a detail emerged that was emblematic for all security operators: the video surveillance server, according to press reports, had as its password… the name of

Xi Jinping proposes a global organization for artificial intelligence

Chinese President Xi Jinping took center stage at Saturday’s APEC leaders’ meeting, proposing the creation of a global organization to manage artificial intelligence. Beijing is seeking to establish itself as an alternative hub for trade and technology cooperation, despite its differences with the United States. According to Xi, a global organization for cooperation on artificial intelligence could establish governance rules and promote international cooperation, turning artificial intelligence into a “public good” for the entire world. The official Xinhua news agency quoted him as saying that artificial intelligence is crucial to future development and should benefit people in all countries and regions. Chinese

The Future of Society in the Age of Artificial Intelligence

Today, many are wondering what impact the spread of Artificial Intelligence will have on our society. Among the most widespread concerns is the loss of millions of jobs and the resulting unprecedented economic crisis. To fully understand what is happening, however, it’s worth making a historical digression. Millennia ago, humanity underwent a transformation that would forever reshape the course of civilization: the transition from hunter-gatherer societies to agricultural communities. It wasn’t a simple lifestyle shift, but a revolution that freed up the most precious commodity in human existence: time. Today, as Artificial Intelligence erupts into our lives, we may find ourselves on

When Google Indexes Even Deception! Ghost Networks Discovered by RHC That Penalize SERPs

RHC analysis of the “BHS Links” network and global Black Hat automated SEO infrastructure An internal Red Hot Cyber analysis of its domain has uncovered a global Black Hat SEO network called “BHS Links,” capable of manipulating Google algorithms through automated backlinks and synthetic content. Many of these sites, hosted on distributed proxy networks in Asia, generated automated backlinks and synthetic content with the aim of manipulating search engine ranking algorithms . These infrastructures combined rotating IPs, residential proxies, and publishing bots to simulate traffic and authority signals, a strategy designed to make the attack indistinguishable from organic activity and to bypass

Alleged EY Data Leak: 4TB of SQL Backups Exposed on Azure Cloud

In recent days, the alleged data leak by Ernst & Young (EY) has become one of the most discussed topics in the international cybersecurity landscape. I decided to reconstruct the story step by step, starting from the technical evidence shared by Recorded Future and the analysis by Neo Security , to understand not only how the exposure occurred, but also what it can teach us about the control of digital assets in complex cloud environments like EY’s. The file, in .BAK format, was accessible without authentication and may have contained sensitive information , such as API keys, service credentials, and authentication tokens.

Theft at the Louvre: The surveillance system’s password “LOUVRE” has put the museum in crisis.

We recently published an in-depth article on the “theft of the century” at the Louvre , in which we highlighted how physical security – access, environmental control, surveillance – is now closely interconnected with logical security, i.e. networks, systems, and data. In that article, we described how the attack on the Musée du Louvre could be interpreted as a true physical-pen test carried out by attackers using advanced OSINT and CTI (Cyber Threat Intelligence) preparatory techniques: detailed reconnaissance, study of shifts, flows, and procedural vulnerabilities, which created the conditions for the heist of the century. The security system had trivial passwords The

South Korea becomes a global hub for artificial intelligence

The APEC summit in Gyeongju , which concluded on January 1, marked a major step forward for South Korea in the field of artificial intelligence. Major international technology companies confirmed significant investments in the construction of AI data centers and other strategic infrastructure. These computing centers, equipped with tens or hundreds of thousands of GPUs, are essential for training and processing next-generation artificial intelligence models. Until recently, Korea had been unable to attract such projects due to a shortage of GPUs and a lack of suitable land. The situation has changed thanks to a strategic partnership with Nvidia , which guaranteed the