Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Banner Ransomfeed 320x100 1
LECS 970x120 1

Category: Cybercrime and Darknet

CISA Warns of Spyware Attacks on Mobile Messaging Apps

An important advisory was published on Monday by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) , warning that malicious actors are actively using commercial spyware tools and remote access trojans (RATs) to target users of mobile messaging apps. “These cybercriminals use sophisticated targeting and social engineering techniques to spread spyware and gain unauthorized access to the victim’s messaging app, facilitating the deployment of additional malicious payloads that can further compromise the victim’s mobile device,” the U.S. agency said. CISA cited several campaigns that emerged since the beginning of the year as examples. These include: The threat actors, according to the agency,

New ClickFix Malware Campaign Targets Windows Users with Fake Updates

Fake Windows updates have entered a new round of ClickFix campaigns, as reported by Huntress. Attackers are increasingly replacing bot controls with full-screen blue windows that simulate a system update. Microsoft notes that ClickFix has become the most common initial penetration method , and that many groups with varying levels of expertise have switched to this method. The attacks begin with a visit to a malicious website that sets the browser to full-screen mode and displays a page that superficially resembles the Windows Update interface. The victim is prompted to manually run the critical update, following a typical ClickFix scenario: open the

GDPR Data Breach: Email Errors and Consequences

Like it or not, sending an email to the wrong recipient constitutes a personal data breach under the GDPR. This obviously applies if the email contains personal data or if personal information can otherwise be inferred from the message. As with any data breach, assessments are necessary. In any case, the event must be recorded and documented, even if notification to the supervisory authority is not mandatory and the breach has been deemed unlikely to pose a risk to the rights and freedoms of natural persons. This is both due to the express provision of Article 33, paragraph 5 of the GDPR,

Ettore Accenti: The Italian Tech Pioneer Who Brought Intel to Italy

With exclusive photographs and unpublished documents: the extraordinary story of the Italian engineer who collaborated with Gordon Moore and Alan Sugar, bringing Intel to Italy and building the first tech empire with Amstrad. 1987. Milan. An entrepreneur receives a phone call from London: create an Italian branch from scratch in three months. With August in between, there were only two months left. Impossible. December 1987: 20 billion lire in turnover. 1989: 120 billion. 2,000 stores built from scratch. From 15 to 60 employees. This is the story of Ettore Accenti , Intel’s first representative in Europe, the man who brought personal computers

Evoluzione-da-wep-a-wpa-3

The AGI Revolution: How Mark Gubrud’s Term Changed Tech Forever

On the porch of an old cabin in Colorado, Mark Gubrud , 67, gazes absently into the distant dusk, his phone beside him, the screen still on a news app. As we know, tech giants Microsoft and OpenAI announced a surprising multi-billion dollar deal to build AGI, paving the way for OpenAI’s $1 trillion IPO. Gubrud smiled wryly: it was he who coined the term AGI, so precious today, 28 years ago. However, he gained neither glory nor riches from it. Gubrud sighed: “It’s already conquering the entire world and its value amounts to trillions of dollars. I’m 67 years old, I

Anthropic Releases Claude Opus 4.5: AI Model for Enhanced Productivity

Anthropic has released Claude Opus 4.5 , its new flagship model, which the company says is the most powerful version yet and ranks at the top of the class for practical programming, agent-based productivity scenarios. The model has also seen significant improvements in in-depth search, analytics, and presentation capabilities. Opus 4.5 is now available via apps, APIs, and across all three major cloud technologies. SOTA in real engineering In the SWE-bench Verified test, the new model shows the best result among all frontier models : Anthropic particularly emphasizes that Opus 4.5 represents a significant step forward compared to Sonnet 4.5, overcoming tasks

Alibaba Qwen3Max Dominates AI Market with Rapid Growth

On November 24, Alibaba announced Qwen3Max, which had been in public beta for a week , and had already surpassed 10 million downloads. It was a record that shattered all others. In a very short time, it had overshadowed ChatGPT, Sora , and even DeepSeek , becoming the fastest-growing AI application ever seen. It was Alibaba’s second China move in 2025 , after DeepSeek had already shaken up the industry earlier this year. The Chinese giant’s shares rose 4.13% in Hong Kong. No overly pompous official announcements, no flashy livestream events: just numbers that spoke for themselves. And the markets, as usual,

Digital Surveillance at Work: The Rise of Algorithmic Monitoring

Remote work has given employees freedom , but with it has also come digital surveillance . We discussed this some time ago in an article, reporting that these monitoring tools are also coming to Microsoft Teams. Therefore, instead of the boss’s unwavering gaze, this role will increasingly be played by ” algorithms ” that monitor how long applications are open, which websites are visited, and how actively the mouse is moved and keys pressed. Advanced systems even analyze employees’ facial expressions and the way they walk in front of a webcam. But these tools also highlight the inherent limitations of collecting personal

Windows Server Vulnerability Exploited: ShadowPad Malware Deployed

A recently patched vulnerability in Microsoft’s Windows Server update services has led to a series of attacks using one of the most notorious espionage tools of recent years. The incidents demonstrate how quickly attackers can move from studying a published exploit to actively exploiting the vulnerability to penetrate infrastructure. According to South Korean company AhnLab , an unknown group gained access to Windows servers running WSUS by exploiting the CVE-2025-59287 vulnerability. This vulnerability was exploited to run standard system utilities, allowing attackers to contact an external server and download malicious code. Before installing the main tool, the PowerCat utility was used, which

Salesforce Data Breach: ShinyHunters Hack Gainsight Integration

The growing data leak from the Salesforce ecosystem has taken a new turn after the ShinyHunters group announced its involvement in the incident. The incident has been ongoing for several months, affecting various CRM-related services, and the scope of the impact continues to grow. ShinyHunters claims to have gained access to Gainsight several months ago by leveraging features gained through a hack of the Salesloft Drift integration. At the time, unknown individuals infiltrated Salesloft’s GitHub account and mined OAuth tokens used by the third-party service Drift with Salesforce . These tokens allowed them to stealthily access the data of a large number