Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Latest news

How Threat Actor make EDR’s harmless with a reboot Cybercrime

How Threat Actor make EDR’s harmless with a reboot

I became aware of this technique like 9 months ago, and now I see this on a attack in the...
Alex Necula - November 22, 2024
The Story Of Conti Ransomware – The War Within (Episode 2) Cybercrime

The Story Of Conti Ransomware – The War Within (Episode 2)

This is a continuation of the Conti story. You can read the previous part, which covered the group's origins, in...
Alessio Stefan - November 22, 2024
IntelBroker Claims Tesla Charging Database Breach Cyber News

IntelBroker Claims Tesla Charging Database Breach

Recently, the threat actor known as IntelBroker , posted an alleged data breach. The post, which appeared on the BreachForums platform, claims...
Redazione RHC - November 20, 2024
Interview with Luca Cadonici: computer and mobile forensics towards a proactive approach against cybercrime Cybercrime

Interview with Luca Cadonici: computer and mobile forensics towards a proactive approach against cybercrime

Nowadays, the Digital Forensics is not just a weapon to fight crime but a scientific discipline that "is no longer...
Olivia Terragni - November 11, 2024
Potential Compromise of a U.S. Military Database Cybercrime

Potential Compromise of a U.S. Military Database

A high-ranking user of BreachForums, known as "GOD," is reportedly selling an alleged database belonging to the U.S. Military, which...
Pietro Melillo - November 6, 2024
Hellcat Claims an Alleged Breach Against Schneider Electric Cybercrime

Hellcat Claims an Alleged Breach Against Schneider Electric

In recent hours, the ransomware group known as Hellcat has claimed responsibility for an alleged attack against Schneider Electric, a...
Pietro Melillo - November 4, 2024
Herm1t Interview – From VX Heaven to the war gates! Hacking

Herm1t Interview – From VX Heaven to the war gates!

This is the story of Herm1t, founder of VX-Heaven, hacker - currently active in protecting Ukraine from 2014 -  and...
Alessio Stefan - November 4, 2024
IBM Hacked? Threat Actor ‘888’ Reveals Thousands of Employees’ Data Leak! Cybercrime

IBM Hacked? Threat Actor ‘888’ Reveals Thousands of Employees’ Data Leak!

Recently, the notorious Threat Actor, identified by the nickname 888 , claimed to have breached IBM systems and stolen personal data belonging to the company's employees....
Luca Galuppi - October 31, 2024
Fortinet Issues Bulletin for Critical 9.8 Bug on FortiManager under Active Exploitation Cyber News

Fortinet Issues Bulletin for Critical 9.8 Bug on FortiManager under Active Exploitation

Recently, Fortinet disclosed a critical vulnerability, identified as CVE-2024-47575, affecting FortiManager. This is a missing authentication vulnerability for critical functions...
Redazione RHC - October 24, 2024
US Elections and psy-ops: main threats come from Digital Echo Chambers and erosion of trust in democratic processes Cyberpolitics

US Elections and psy-ops: main threats come from Digital Echo Chambers and erosion of trust in democratic processes

On November 5th, 2024, the next President and Vice President of the United States of America will be elected, as...
Olivia Terragni - October 22, 2024
T-Space Architects Potentially Targeted by Cicada3301 in Data Broker Ransomware Attack   Cybercrime

T-Space Architects Potentially Targeted by Cicada3301 in Data Broker Ransomware Attack  

 London-based architectural firm T-Space Architects may find itself at the center of a significant cyberattack. The ransomware group Cicada3301 has...
Inva Malaj - October 20, 2024
Stormous claims an attack on NASA Cybercrime

Stormous claims an attack on NASA

In recent years, the landscape of cyber threats has been dominated by increasingly sophisticated ransomware groups. Among them, the ransomware...
Pietro Melillo - October 9, 2024

NIST selects second PQC Key Encapsulation algorithm

The fourth round of the American National Institute of Standards and Technology (NIST) Post Quantum Cryptography (PQC) competition has selected HQC as a secondary quantum-resilient key encapsulation mechanism (KEM) to...

Paragon Spyware – Let’s talk about privacy and governments

Politics, information technology, and privacy. A triad continually seeking balance with a history of conflict that originates from the introduction of personal computers at the consumer level. Attempts by the...
hacktivismo

Beyond the Dark Storm’s attack on X: how hacktivism’s Illusion reinforces the System

The Dark Storm attack on X (formerly Twitter) has been significant for several reasons. The attack on March 10 2025 - a multi-layered Distributed Denial-of-Service (DDoS) using a botnet -...

Babuk Locker 2.0: The New Ransomware Affiliate Program

Babuk, one of the most notorious ransomware groups in cybercrime, has launched the Babuk Locker 2.0 Affiliate Program 2025, an affiliate program for skilled hackers looking to profit from ransomware...

NightSpire: A New Player in the Ransomware Landscape

During our reconnaissance into the underground world and criminal groups conducted by Red Hot Cyber's threat intelligence laboratory DarkLab, we stumbled upon a Data Leak Site of a cyber gang...

Crazyhunter: The Ransomware with the Three-Dimensional Data Annihilation System That Redefines Data Destruction

In the reconnaissance of the world of the underground and criminal groups carried out by Red Hot Cyber's DarkLab threat intelligence lab, we came across a Data Leak Site of...

Interviewing ChatGPT: the AI that feels human, to its Asperger’s users.

Have you ever experienced that ChatGPT recognizes who it is talking to? I share my ChatGPT account with my spouse, and when he uses it, he gets the generic, prepackaged...

Akira Ransomware: The New Threat Using Webcams as Entry Points

Akira represents one of the most recent ransomware threats capable of bypassing traditional organizational defense mechanisms. A recent case analyzed by the S-RM team highlighted how this group leveraged an...

Possible breach at Ukraine’s Ministry of Foreign Affairs: the Qilin Ransomware group claims responsibility for the attack

The Qilin Ransomware group claims to have compromised the systems of Ukraine’s Ministry of Foreign Affairs, stealing private correspondence, personal information, and official decrees. According to the attackers, some of...

Analysis of Recorded Future’s CVE Report – February 2025

The monthly Recorded Future CVE report for February 2025 provides a detailed overview of current cybersecurity threats, highlighting a slight decline compared to the previous month. A total of 25...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE