Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
TM RedHotCyber 320x100 042514
Banner Ancharia Desktop 1 1

Category: Cybercrime and Darknet

Port scanning in 2025: Nmap and AI — how to integrate them securely and operationally

In 2025, port scanning remains a key activity for both Red Teams (reconnaissance, discovery, fingerprinting) and Blue Teams (monitoring and proactive defense). But the latest development is the arrival of Large Language Models (LLMs), integrated directly into the technical workflow. One of the most interesting examples is LLM-Tools-Nmap , presented by Hackers Arise , which allows you to drive Nmap via natural language instructions . In practice, the template translates the request (“scan the most common web ports on this /24 at a moderate speed and output to XML”) into a correct and safe Nmap command, including timing options, NSE scripts, and

The Louvre Theft: When Thieves Taught the World the Physical Pen Test

The event that shook the world on October 19, 2025, was not a natural disaster or a financial collapse, but the sensational theft of Napoleon’s jewels from the Louvre Museum. Beyond its historical and artistic value, for the cybersecurity community, this episode represents the most educational and costly Physical Pen Test case study of the year. The Louvre, with its multilayered security protocols, advanced sensors (biometric, seismic, infrared) , and elite security team, can be conceptualized as the physical equivalent of a corporate network with a Zero Trust architecture and a next-generation WAF/Firewall . Its breach demonstrates that true resilience is not

AzureHound: The “Legitimate” Tool for Cloud Attacks

AzureHound, part of the BloodHound suite, was born as an open-source tool to help security teams and red teams identify vulnerabilities and escalation paths in Microsoft Azure and Entra ID environments. Today, however, it is increasingly used by criminal groups and state-sponsored actors for very different purposes: mapping cloud infrastructures, identifying privileged roles, and planning targeted attacks. Why AzureHound Became a Dangerous Tool Written in Go and available for Windows, Linux, and macOS, AzureHound queries Microsoft Graph and Azure REST APIs to gather information about identities, roles, applications, and resources in your tenant. Its operation, designed for legitimate purposes, is also useful

Red Hot Cyber launches free real-time CVE Enrichment service

Timeliness is key in cybersecurity. Red Hot Cyber recently launched a completely free service that allows IT professionals, security analysts, and enthusiasts to monitor the most critical vulnerabilities published in the US National Vulnerability Database (NVD) . Critical CVEs issued in the last 3 days The service allows you to view the latest critical CVEs (Common Vulnerabilities and Exposures) issued in the last three days , with the ability to filter the information by severity score and view bugs issued by the most popular vendors . This way, organizations can quickly identify the most relevant threats to their systems and applications. But

Going 50 Years Without Charging Your Phone: Here’s the Chinese Battery That Will Change Everything

Beijing-based Betavolt claims to have developed a nuclear battery that represents the world’s first achievement in the miniaturization of atomic energy. This innovation involves integrating 63 nuclear isotopes into a module smaller than a coin. The new battery, described as next-generation, uses a process known since the 20th century to convert the energy released by the decay of isotopes directly into electricity. According to the manufacturer, the project is now in the advanced pilot testing phase; the goal is to launch large-scale production for commercial applications, such as powering drones and phones. As part of China’s 14th Five-Year Plan, which aims to

Mossad, the rigged supply chain, and intimidated judges

Yossi Cohen, former director of the Mossad, has said publicly two things that usually remain locked away in a room without tape recorders. First, Israel allegedly deployed a global sabotage and surveillance network over time by inserting tampered hardware into commercial devices used by its adversaries. We’re talking about radios, pagers, and “normal” communications equipment that can actually locate, listen, or explode. This infrastructure, he says, has been deployed “in every country you can imagine.” He said this in a recent interview, which was reported by outlets like Middle East Monitor and Israeli media , citing the podcast “The Brink.” Second, Cohen

Windows 11 Task Manager Bug: How to Fix It

Microsoft’s Windows 11 updates often contain unexplained bugs, especially patches for new features, such as the recently released KB5067036 . While KB5067036 is an optional update, it introduced a completely new Start menu and updates to the taskbar and File Explorer , making it highly anticipated. However, a bug was found in Task Manager. The bug is that when a user closes the Task Manager window as usual, the program is not actually closed and remains in the background. If the program is reopened, it will be regenerated. During the test, a maximum of 100 background processes were generated. Since it also

Linux and gaming: an increasingly reliable combination

According to Boiling Steam , the number of Windows games running reliably on Linux is the highest ever recorded. The analysis is based on statistics from ProtonDB , which collects user reports on game launches via Proton and WINE. The researchers note that the games are divided into five categories: Platinum – works perfectly out of the box; Gold – requires minimal settings; Silver – playable but with issues; Bronze – intermediate; Borked – doesn’t work at all. These ratings are only partially comparable to the Steam Deck Verified system, which takes into account the performance of a specific device. The graph

Microsoft Exchange in the crosshairs: The CISA guide to surviving attacks!

A rapid response to the increasing threats against email infrastructure was provided by the Cybersecurity and Infrastructure Security Agency (CISA), in collaboration with the National Security Agency (NSA), the Australian Cyber Security Centre (ACSC) and the Canadian Centre for Cyber Security . The document, titled ” Microsoft Exchange Server Security Best Practices ,” emphasizes proactive hardening measures in the event of persistent attacks on these critical systems, which handle sensitive business communications. It is essential to prioritize thorough maintenance of security updates and patches to adopt a prevention-first approach, as highlighted in the guide that emphasizes the importance of this strategy. A

Russian Interior Ministry officials arrested the creators of the Medusa malware

The Russian programming team behind the Medusa malware has been arrested by officials from the Russian Interior Ministry, with the support of police in the Astrakhan region. According to investigators, three young IT specialists were involved in the development, distribution, and implementation of viruses designed to steal digital data and breach security systems. Irina Volk reported this on the Telegram channel , attaching a video of the arrests. Investigators have determined that the group’s activities began approximately two years ago. At the time, the suspects had created and published on hacker forums a program called Medusa, capable of stealing user accounts, cryptocurrency