Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
UtiliaCS 320x100
2nd Edition GlitchZone RHC 970x120 2

Category: Cybercrime and Darknet

Inmates hack prison: sentences reduced, funds transferred, and unauthorized visits

The Romanian penitentiary system has found itself at the center of a major digital scandal: inmates in Târgu Jiu hacked the PNA’s internal platform and, for several months, managed data on prison sentences, fund transfers, and prison conditions undetected. This is the first documented case of inmates gaining access to the secure system used to administer all of the country’s penitentiary institutions. The incident began in July, when a convicted cybercriminal was temporarily admitted to the Dej prison hospital. There, he memorized the login and password of an employee with administrative rights. Upon returning to his facility, he used these credentials to

Using a VPN to watch adult content? It’ll be a crime in Wisconsin.

Wisconsin authorities have decided to go further than most other US states in promoting mandatory age verification for accessing adult content. AB 105 / SB 130 , first introduced in March and already debated in the Assembly, is now before the Senate. Its goal is to require all websites distributing material “harmful to minors” not only to implement an age verification system but also to block access to users connected via VPN. This requirement effectively makes it illegal to use a VPN to circumvent state age restrictions. The authors argue that VPNs hinder effective surveillance by allowing adults and teenagers to hide

Introduction to Convolutional Neural Networks

In the ever-expanding world of artificial intelligence (AI), there is a revolutionary technology that has changed the way machines “see” and “understand” the world around them: Convolutional Neural Networks (CNNs). These powerful algorithms have opened new frontiers in computer science, making possible what was once considered science fiction. But what exactly are CNNs and how do they work? Get ready to discover all this in our journey through the history, fundamental concepts, and applications of this fascinating technology. The History of Convolutional Neural Networks Convolutional Neural Networks, like many of humanity’s greatest inventions, didn’t happen overnight. Their development began in the 1980s

Pasquale’s Experience: A Text Message in the Heat – Session 1

Cybercrime is increasingly looming over the unfortunate online world. Fake profiles and scams are rampant on social networks, which, even with the best artificial intelligence, struggle to keep up with a phenomenon that generates scams of all kinds. This column aims to raise awareness among everyone about the ever-increasing number of online scams, primarily originating from emails and social networks. This will be done through first-person stories told by the unfortunate victims, providing a final lesson learned. Author : Massimiliano Brolli Pasquale’s experience Hi guys, my name is Pasquale, I’m 55 years old and I’ve had an online bank account for a

Inside IEEE 802.11 Wireless Networks: Wi-Fi Architecture and Signaling

IEEE 802.11 wireless networks, better known as Wi-Fi, are the beating heart of modern connectivity. From a niche solution for home use to a technological cornerstone for the Internet of Things (IoT), smart cities, and enterprise infrastructure, Wi-Fi has evolved unstoppably. Today, in 2025, the arrival of Wi-Fi 7 (IEEE 802.11be) brings theoretical speeds of over 46 Gbps and latencies of less than a millisecond, but with it comes new challenges: security, interference, and spectrum management. In this article, part of Red Hot Cyber’s Wi-Fi series, we analyze the fundamentals of IEEE 802.11 networks, exploring their architecture, signal behavior, advantages, and limitations.

WiFi: From Marconi’s Origins to the Wireless Network We Know Today

Today, we live in a world where WiFi is a fundamental necessity, but how did this technology, now taken for granted, come about? How did it then develop into the network we now use every day? In this article, we’ll explore the origins and evolution of WiFi. We’ll analyze both the technologies that made it possible and the threats that accompany it. This article is the first in our ” WiFi Column ,” where we’ll delve into the mechanisms and techniques of attack, illustrating the best strategies for protecting our wireless connection. Welcome to a world without wires… and without secrets. The

Operation SIMCARTEL: 1,200 SIM boxes and 40,000 SIM cards stopped by Europol

On October 10, 2025, Latvian authorities conducted a day of action that resulted in the arrest of five Latvian citizens suspected of running a large-scale cyber fraud network. The operation, dubbed SIMCARTEL , also involved joint investigations and investigative activities with Austria, Estonia, Europol, and Eurojust. During the searches, investigators deactivated five servers linked to the illicit infrastructure and seized approximately 1,200 SIM-box devices along with 40,000 active SIM cards. Hundreds of thousands of additional SIM cards were also located and placed under surveillance. Two other suspects connected to the same network were arrested during the operation. Law enforcement agencies attribute thousands

SSRF Vulnerability in Zimbra Collaboration Suite: Urgent Update Required

A Server-Side Request Forgery (SSRF) security vulnerability was recently discovered in Zimbra Collaboration Suite, raising security concerns and prompting administrators to promptly apply security patches to affected systems. According to Zimbra’s latest advisory, this critical SSRF vulnerability affects Zimbra versions 10.1.5 through 10.1.11. Attackers could exploit the issue by manipulating URL requests to trick the server into performing unwanted actions, such as accessing restricted endpoints or internal systems. The issue, detected in the chat proxy settings module, could allow attackers to gain unauthorized access to internal resources and sensitive user data. While the likelihood of the issue spreading is considered low, its

Problems with localhost on Windows 11 after October updates

The October updates for Windows 11 broke localhost functionality, preventing applications connecting to 127.0.0.1 over HTTP/2 from working properly. While developers typically use localhost to test websites and debug applications, it can also be used by applications that need to connect to a locally running service to perform actions or requests. After installing Windows 11 update KB5066835 and the September Preview Update KB5065789 , users found that applications were no longer able to complete HTTP connections to the localhost IP address (127.0.0.1). When they attempted to connect, they received errors such as “ERR_CONNECTION_RESET” or ” ERR_HTTP2_PROTOCOL_ERROR.” The issue has been reported on

Huawei unveils HarmonyOS 6: the new operating system coming October 22nd

And to think that until a few years ago, Huawei and much of its ecosystem were entirely dependent on Google Android. Then came the bans: first the Android ban , then the ban on chip manufacturing equipment , and finally on artificial intelligence technologies . A US strategy that, paradoxically, produced the opposite effect to the desired one: instead of weakening the company, it fueled an extraordinary push towards technological independence . In trying to hinder Huawei’s growth, the United States ended up accelerating it , unwittingly encouraging the development of a completely autonomous technological ecosystem. Huawei has officially launched HarmonyOS 6