Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
320×100
Banner Ransomfeed 970x120 1

Category: Cybercrime and Darknet

Python to Rust: A More Secure Future for the Programming Language

Two CPython developers have proposed adding the Rust programming language to the Python codebase . Emma Smith and a colleague have published a Preliminary Python Enhancement Proposal (Pre-PEP) justifying this step. Currently, Rust is only intended for writing optional extension modules, but it may become a required dependency in the future. The main reason for adopting Rust is to improve memory safety . The language prevents entire classes of compile-time errors: out-of-bounds array accesses, accesses to freed memory, and data conflicts in multithreaded code. This is especially relevant for Python, which uses free threads, where thread safety is paramount. The RustBelt project

Multi-threaded Hacking: US Pioneers Automated Operations with AI Agents

In recent months, a new cyber operations infrastructure has been developing in the United States, in which automated agents are becoming not just a support tool, but a full-fledged participant in offensive operations . Amid competition with China over autonomous systems capabilities, Washington is investing heavily in research that expands the scope of attacks and reduces preparation times, focusing on the concept of multi-threaded hacking based on artificial intelligence. One of the centers of this initiative is the little-known company Twenty , based in Arlington , which has received several contracts from U.S. military agencies. The company, which has not yet formally

WhatsApp data leak: 3.5 billion numbers “stolen” by researchers at the University of Vienna

The scale of the leak, described by a team from the University of Vienna , demonstrates how dangerous the familiar contact search function of popular messaging apps can be. WhatsApp has always emphasized the ease of adding new people: simply enter a phone number into your address book, and the service instantly reveals whether the person is registered on the app, revealing their name, photo, and partial profile . However, this simplicity has become the basis for one of the largest collections of user data in history, and all of this has happened without hacking or circumventing technical barriers. Austrian researchers decided

Google launches Gemini 3, its most advanced artificial intelligence model

Google has announced the launch of Gemini 3, the next generation of its flagship artificial intelligence model, which the company is integrating into search, the Gemini app, cloud services, and developer tools. Google management calls Gemini 3 the smartest model in its lineup and the next step toward artificial general intelligence (AGI). Nearly two years ago, the company launched the so-called Gemini era , and since then, the scale of AI adoption has grown significantly. According to Google, AI Overview mode in search now reaches approximately 2 billion monthly users, the Gemini app is reaching 650 million monthly active users, over 70%

CISA’s ‘Secure by Design’ Pledge: A Year of Progress in Cybersecurity

By Carl Windsor, Chief Information Security Officer at Fortinet Secure-by-design practices represent a fundamental shift in software development: security is no longer considered an afterthought, but is integrated from the ground up, into the very DNA of the product. This philosophy is widely recognized as a best practice in the industry, but it is not yet mandatory, nor is it uniformly applied, nor is it fully understood by customers. However, adopting a secure-by-design approach is increasingly crucial, as digital infrastructures face an unprecedented speed and volume of sophisticated threats. Cybercriminals, both inexperienced and highly skilled, are leveraging new resources—from purchasing exploit kits

Cloudflare global outage: It was an internal technical error. Let’s find out the cause.

On November 18, 2025, at 11:20 UTC , a significant portion of Cloudflare’s global infrastructure suddenly ceased to properly route Internet traffic, displaying an HTTP error page to millions of users worldwide reporting an internal malfunction in the company’s network. The outage affected a wide range of services—from the CDN to the Access authentication systems —generating a wave of 5xx errors. According to Cloudflare, which is extremely transparent, the cause was not a cyber attack but an internal technical error , triggered by a change to the permissions of a database cluster. Cloudflare immediately clarified that no malicious activity, direct or indirect,

Cloudflare goes down in the magnificent cloud! Global incident is being resolved.

November 18, 2025 – After hours of widespread disruptions , the incident affecting Cloudflare’s global network finally appears to be nearing resolution. The company announced it has implemented a fix and is now actively monitoring the situation, following a day of outages, intermittent errors, and issues with application and security services. The incident, which began at 11:48 UTC , affected multiple components of Cloudflare’s infrastructure, causing slowdowns, timeouts, and crashes globally, also impacting the CDN, API, authentication, and management dashboard. Below is the complete reconstruction of the day. Cloudflare Incident Timeline 11:48 UTC – Start of the incident Cloudflare reports an internal

Cloudflare Down: Websites and Services to Go Down on November 18, 2025

The morning of November 18, 2025, will be remembered as one of the most anomalous and widespread outages on the Cloudflare network in recent months. The CDN—the beating heart of millions of websites, applications, and API services—began experiencing cascading outages across several geographic areas, significantly impacting our site, Red Hot Cyber , which uses Cloudflare infrastructure for CDN, caching, and DDoS protection. The following notice has been posted on the Cloudflare System Status portal: 11:48 UTC: “Cloudflare is aware of, and investigating an issue which potentially impacts multiple customers.” 12:03 UTC: “We are continuing to investigate this issue.” Downdetector also down One

IBM AIX: Two critical bugs allow execution of arbitrary commands (Score 10 and 9.6)

Two serious vulnerabilities in IBM’s AIX operating system could allow remote attackers to execute arbitrary commands on affected systems, prompting the company to issue important security updates. Both vulnerabilities represent attack vectors for previously addressed bugs in CVE-2024-56347 and CVE-2024-56346. This unfortunately indicates that IBM’s previous patches may not have completely eliminated all exploitation paths, making these additional security updates necessary. The most severe bug, tracked as CVE-2025-36250, affects the NIM server service (nimesis), formerly known as NIM master. This flaw is even more critical, having achieved a perfect CVSS score of 10.0. The other identified critical flaw, tracked under CVE-2025-36251, affects

Twitter Hack: $4.1 Million Seized from 26-Year-Old Joseph James O’Connor

The story of the global Twitter hack in the summer of 2020 has had a sequel: British prosecutors have obtained the seizure of cryptocurrency mined by a key participant in the attack. The court ordered 26-year-old Joseph James O’Connor to return assets worth £4.1 million (approximately $5.4 million). This means the state has gained access to 42 bitcoins and related digital assets discovered during the multi-year investigation. The chain of events began with an unusually brazen attack , in which a criminal managed to gain control of the accounts of world leaders and entrepreneurs to defraud cryptocurrency users and intimidate celebrities. The