Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
TM RedHotCyber 320x100 042514
970x120

Category: Cybercrime and Darknet

“If you install Windows 11, you can die!” YouTube blocks videos on unsupported PCs.

YouTube’s automatic moderation is at the center of a heated debate regarding its limitations. Due to the platform’s algorithms, numerous videos demonstrating how to install Windows 11 on unsupported PCs or without a Microsoft account have been removed altogether . The authors of this content, as well as other users, disagree with YouTube’s artificial intelligence’s decision to classify these instructions as “dangerous.” Tech blogger Rich White, who goes by the handle CyberCPU Tech, was the first to report the issue. On October 26, he noticed that his video on installing Windows 11 25H2 with a local account had disappeared shortly after it

Discover the Dark Web: Access, Secrets, and Helpful Links to the Onion Network

Have you always thought that the Dark Web is frequented by cybercriminals? Have you always thought that the Dark Web is a dangerous and treacherous network? Today we want to dispel this myth and raise awareness—and therefore knowledge—about this technological marvel that has always protected the anonymity and privacy of countless users. The Dark Web is a part of the internet that can’t be reached with standard browsers (Chrome, Firefox, Edge). To access it, you need to use specific tools like the Tor Browser , which guarantees anonymity and allows you to visit so-called onion services . Many associate the Dark Web

Robots are starting to take their place in society thanks to new AI algorithms.

On September 25, Google DeepMind released a video demonstrating how its humanoid platforms handle multi-step, everyday tasks using multimodal reasoning. In a series of demonstrations, the machines confidently performed sequences of actions, including sorting objects according to predetermined rules. The intelligence of these systems is based on the Gemini Robotics 1.5 family. Two components work together: the basic model translates visual signals and text messages into specific movements, while the modified Gemini Robotics-ER 1.5 version creates plans and reasoning step-by-step about the current situation, choosing the right sequence of steps. The so-called banana test clearly demonstrates the progress. Previously, the robot was

Google Android Protects Users from Fraud, But Watch Out on Mondays

Google has shared new data on Android’s built-in protections against text and call fraud. According to the company, the system blocks over 10 billion suspicious contacts each month , in an effort to prevent data theft and user fraud before malicious activity reaches its target. One of the key security features was a filter for Rich Communication Services , the protocol that replaced traditional SMS. Over 100 million phone numbers were blocked before they could send a single message . Additionally, the Google Messages app uses a spam filtering mechanism that leverages a local neural network : suspicious messages are immediately sent

OpenAI may have lost $12 billion in its latest fiscal quarter.

Microsoft’s financial report indicates that OpenAI may have lost $12 billion in its latest fiscal quarter. An expense in Microsoft’s earnings report (517.81, -7.95, -1.51%) surprised analysts: a $4.1 billion charge related to its investment in OpenAI. This figure represents a 490% increase compared to the same period last year. Bernstein analyst Firoz Valliji said that based on Microsoft’s previous quarterly report, which showed the company holds a 32.5% stake in OpenAI, this means OpenAI suffered a quarterly loss of more than $12 billion. This is because Microsoft uses an accounting method called the ” equity method” to manage its stake in

Android Malware Steals NFC-Enabled Credit Cards

In Eastern European countries, there has been a rapid increase in malicious Android apps that exploit contactless data transfer technology to steal credit cards. According to Zimperium, over 760 programs using NFC technology to gain unauthorized access to payment information have been detected in recent months. Unlike banking Trojans that spoof interfaces or gain remote access to devices, this new type of malware uses the host card emulation mechanism, allowing a smartphone to imitate a bank card . These apps intercept EMV protocol fields, respond to terminal requests with predefined commands, or forward them to a remote server, where the correct responses

The race for cybersecurity has begun and Italy is running with its shoes tied

In recent years, cybersecurity has risen to the top of the agendas of businesses, institutions, and public administration. But if we look at the numbers, Italy still seems to be running on empty: it invests approximately 0.12% of GDP in digital security, less than half that of France and Germany and barely a third of the United Kingdom and the United States (sources: Clusit Report 2025, DeepStrike Cybersecurity Spend Report 2025). This limited budget translates into an often outdated and dusty toolkit, unable to keep pace with the scale and complexity of attacks. The Clusit 2025 Report paints a picture of a

Taiwan launches international initiative for submarine cable safety

On October 28, 2025, during the Taiwan-EU Submarine Cable Safety Cooperation Forum held in Taipei, Taiwanese Foreign Minister Lin Chia-lung introduced the “International Initiative for Submarine Cable Risk Management” , stressing that it is not a Taiwan-only project, but a global cooperation agreement . A partnership for the resilience of digital infrastructure The event, jointly organized by the Center for Science, Democracy and Society (DSET) , the Formosa Club and the Ministry of Foreign Affairs , brought together experts, government representatives and European institutions. Among the speakers was Richards Kols , president of the Formosa Club of Taipei and member of the

Port scanning in 2025: Nmap and AI — how to integrate them securely and operationally

In 2025, port scanning remains a key activity for both Red Teams (reconnaissance, discovery, fingerprinting) and Blue Teams (monitoring and proactive defense). But the latest development is the arrival of Large Language Models (LLMs), integrated directly into the technical workflow. One of the most interesting examples is LLM-Tools-Nmap , presented by Hackers Arise , which allows you to drive Nmap via natural language instructions . In practice, the template translates the request (“scan the most common web ports on this /24 at a moderate speed and output to XML”) into a correct and safe Nmap command, including timing options, NSE scripts, and

The Louvre Theft: When Thieves Taught the World the Physical Pen Test

The event that shook the world on October 19, 2025, was not a natural disaster or a financial collapse, but the sensational theft of Napoleon’s jewels from the Louvre Museum. Beyond its historical and artistic value, for the cybersecurity community, this episode represents the most educational and costly Physical Pen Test case study of the year. The Louvre, with its multilayered security protocols, advanced sensors (biometric, seismic, infrared) , and elite security team, can be conceptualized as the physical equivalent of a corporate network with a Zero Trust architecture and a next-generation WAF/Firewall . Its breach demonstrates that true resilience is not