Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Enterprise BusinessLog 320x200 1
Banner Ransomfeed 970x120 1

Category: Cybercrime and Darknet

Trump-Xi Summit: A Truce That Doesn’t Benefit Europe

After years of tensions, tariffs, mutual accusations, and trade wars that have shattered the global balance of power, the long-awaited meeting between Donald Trump and Xi Jinping has finally taken place. The face-to-face meeting, which lasted about an hour and forty minutes, took place on Thursday, October 30, at Gimhae Air Base in Busan, South Korea . Initial reports indicated that the summit would have been “positive”—but not for everyone. A truce that suits both Washington and Beijing Trump, visibly pleased, spoke to reporters aboard Air Force One and said, “It was a fantastic meeting. He’s a great leader,” and also added

Cloud yes or Cloud no: When the Digital Sky Darkens

The outage of Microsoft’s cloud services, which occurred just hours before the release of its quarterly results, is just the latest in a long series of outages that are exposing a structural vulnerability in our digital ecosystem. When platforms like Azure or AWS go down, the ripple effect spreads far beyond the technological sphere: entire companies, public services, communications platforms, and even airlines find themselves paralyzed. The cloud, born as a symbol of efficiency, flexibility, and scalability, has now become a critical dependency . Its promise of always-on availability clashes with the reality of centralized points of failure . A few hours

Taiwan: Up to 7 years in prison for those who damage undersea cables

Taipei, October 30, 2025 – Taiwan’s Legislative Yuan Economic Commission has approved the first reading of a series of amendments to the so-called “Seven Submarine Cable Laws,” introduced to address frequent incidents of damage to submarine infrastructure surrounding the island. The amendments—which affect the Electricity Law, the Natural Gas Activities Law, and the Water Supply Law—provide harsher penalties for those who intentionally destroy water pipes, power cables, or underwater gas pipelines, with penalties of up to seven years in prison . Furthermore, authorities will have the power to confiscate vessels used to commit such crimes. A more stringent legislative package On September

95% of companies believe they’re ready for ransomware. But only 15% actually are!

Companies’ widespread confidence in their cyber resilience is facing a new wave of threats, this time from artificial intelligence. According to the OpenText Cybersecurity 2025 Report, 95% of organizations worldwide believe they can recover from a ransomware attack. However, the reality turned out to be much more complex: only 15% of victims actually recovered all their data, and a growing number of incidents are attributed to the use of artificial intelligence for offensive purposes. A study of nearly 1,800 security professionals and business executives from the United States, Canada, Europe, and Australia shows that trust levels are rising in tandem with the

Cyber Incident Management in the NIS2 Era

The NIS 2 Decree (Legislative Decree 138/2024), effective October 16, 2024, implements the principles of the European NIS2 Directive, laying the foundation for a more complex operational model of collaboration between stakeholders and the competent authority regarding cyber incident management. This management is essentially more rigorous, structured, and binding, with extended notification obligations and specific deadlines for businesses and public administrations. In fact, to fulfill the obligations set forth in Articles 23, 24, and 25 of the decree, NIS entities are required to adopt security measures and notify CSIRT Italia – the unit established within the ACN to monitor and respond to

US builds largest AI supercomputer in history

The U.S. Department of Energy (DOE) has entered into a strategic collaboration with Nvidia and Oracle to build seven next-generation AI-powered supercomputers , set to revolutionize scientific research and the development of intelligent agents. Two of these systems will be installed at Argonne National Laboratory in Illinois, which will house the largest AI supercomputing infrastructure ever built by the Department of Energy. At NVIDIA’s GPU Technology Conference, CEO Jensen Huang announced Project Solstice , described as the largest AI supercomputer ever built for the DOE. The system will be equipped with 100,000 Blackwell GPUs and built in collaboration with Oracle and Argonne

Microsoft 365 goes down: DNS anomaly paralyzes services worldwide

A DNS service outage was detected by Microsoft on October 29, 2025, impacting access to critical services such as Microsoft Azure and Microsoft 365. An anomaly was detected at 21:37 GMT+5:30, causing widespread delays in various applications and blocking users from accessing the Microsoft 365 admin area. According to initial reports, DNS resolution difficulties were hindering proper traffic management, negatively impacting authentication and service endpoints. The reliance on these platforms for email, collaboration, and cloud computing services led to service unavailability issues. The outage affected numerous regions, sparking widespread complaints on social media and tech forums in North America, Europe, and Asia.

Tor Browser Says No to Artificial Intelligence! Security Comes First

Interestingly, while major companies like Microsoft and Google are actively adding AI features to their browsers, the Tor development team has chosen to remove them. @henry, a Tor project contributor, pointed out that the team failed to fully verify the training process and the “black box” behavior of the AI models, so they decided to eliminate risks first . While some users may be willing to “accept Mozilla’s risks” for certain features, the Tor project explicitly prioritizes not integrating these features. Among the removed components are Mozilla’s AI-powered chat sidebar, introduced in March of this year, and the page summary link preview

Nvidia launches NVQLink for quantum computing

Nvidia hasn’t developed its own quantum computer, but CEO Jensen Huang is betting the company will play a key role in the technology’s future. In his keynote address at Nvidia’s Global Technology Conference (GTC) in Washington, D.C. , on Tuesday, Huang announced NVQLink , an interconnect technology that connects quantum processors to the AI supercomputers they need to function effectively. He said: “NVQLink is the key to connecting quantum and classical supercomputers.” Quantum processors represent a completely new way of computing, using the principles of quantum physics to solve problems that current classical computers cannot solve. Their applications are vast, from scientific

Tasting the Exploit: HackerHood tests Microsoft WSUS CVE-2025-59287 Exploit

The cybersecurity landscape was recently rocked by the discovery of a critical Remote Code Execution (RCE) vulnerability in Microsoft’s Windows Server Update Services (WSUS) . Identified as CVE-2025-59287 and with a CVSS score of 9.8 (Critical) , this flaw poses a high and immediate risk to organizations using WSUS for centralized update management. The vulnerability is particularly dangerous because it allows a remote, unauthenticated attacker to execute arbitrary code with system privileges on the affected WSUS servers. After Microsoft released an emergency out-of-band patch on October 23, 2025, which was necessary because the initial October patch had not fully addressed the issue,