Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
320x100 Itcentric
UtiliaCS 970x120

The Red Hot Cyber community

The Red Hot Cyber community is made up of a collection of people who actively collaborate, with different roles, to create targeted content focused on information security and technology, with the aim of spreading awareness and culture, and generating a mentality of widespread attention to IT risk and technology in general. All free of any political contamination. 

Pagina di Alessio Stefan

Alessio Stefan
(39 articoli, 24 italiano, 15 inglese)39 articoli
24 italiano, 15 inglese

Member of the Dark Lab group. Love the red color.

Ultimi articoli di Alessio Stefan in inglese

Xi Jinping and the Chinese APT’s Ambition
The post-COVID macro political movements, including ongoing conflicts, have prompted a majority of states to shift their medium- to long-term politica...
Paragon Spyware – Let’s talk about privacy and governments
Politics, information technology, and privacy. A triad continually seeking balance with a history of conflict that originates from the introduction of...
The Story Of Conti Ransomware – The Last Ceremony (Final Episode)
This is the last episode of “The Story Of Conti Ransomware” series, we would finally reach the decline of the group and what this means for the cu...
FBI responds to threats and announcement of LockBit 4.0
In the last month of 2024, LockBit has been exodusively talked about. The prominent news is the long-awaited release of the 4.0 program of the most fa...
The Story Of Conti Ransomware – The War Within (Episode 2)
This is a continuation of the Conti story. You can read the previous part, which covered the group’s origins, in the previous article. We will now e...
Herm1t Interview – From VX Heaven to the war gates!
This is the story of Herm1t, founder of VX-Heaven, hacker – currently active in protecting Ukraine from 2014 –  and founder of RUH8 in fall 2015,...
The Story Of Conti Ransomware – Origins and Evolution of the RaaS Model (Episode 1)
Ransomware, a malware designed to encrypt data making them restorable only with the use of a private key. Relatively simple math is all that threat ac...
Donald Trump’s campaign under attack! Documents and internal communications exfiltrated
After the European elections unfolded, geopolitical attentions shifted to the U.S. election campaign, one of the most dynamic in recent years recently...
NSO Group targeted! BlackMeta attacks Spyware maker’s central domain
The Pro-Palestinian group BlackMeta (or DarkMeta) announced on August 1, 2024, on their official telegram channel that they conducted a destructive at...
The Hackers Choice – 30 years of hacking without trying to get rich!
Imagine a time before firewalls and ubiquitous encryption, when the digital frontier was wide open for exploration. Hackers weren’t criminals, they ...
The New RockYou2024 Collection has been published! 10 Billion Credentials Compromised
Everyone involved with CTF has used the infamous rockyou.txt wordlist at least once, mainly to perform password cracking activities. The file is a ...
Serious Vulnerability in Windows Systems: Here’s How an Attacker Can Gain Complete Control of Your PC
A severe security vulnerability has been discovered in MSI Center, a widely used software on Windows systems. This flaw, classified as CVE-2024-377...
Medusa Ransomware claims responsibility for the attack on Harry Perkins Institute
On July 3, 2024, the Australian research institute Harry Perkins was the victim of a ransomware attack claimed by MEDUSA on their official DLS. More t...
Potential Data Breach: Sensitive Indonesian Data for Sale on Dark Web
A recent alert in information security landscape has been issued: a threat actor has announced the sale of the Attorney General’s Office of the Rep...
PRAISE TO VX-UNDERGROUND – The hack-library turns 5!
Every nerd or technology enthusiasts cannot deny the influence of the 1980s on modern computer science. Commodore Amiga, Nintendo, Apple II, now compu...