Red Hot Cyber. The Cybersecurity Blog

Crazyhunter: The Ransomware with the Three-Dimensional Data Annihilation System That Redefines Data Destruction
In the reconnaissance of the world of the underground and criminal groups carried out by Red Hot Cyber’s DarkLab threat intelligence lab, we came across a Data Leak Site of a cyber gang that had never been monitored before: Crazyhunter.

Interviewing ChatGPT: the AI that feels human, to its Asperger’s users.
Have you ever experienced that ChatGPT recognizes who it is talking to? I share my ChatGPT account with my spouse, and when he uses it, he gets the generic, prepackaged answers that most users receive. However, I get a more

Akira Ransomware: The New Threat Using Webcams as Entry Points
Akira represents one of the most recent ransomware threats capable of bypassing traditional organizational defense mechanisms. A recent case analyzed by the S-RM team highlighted how this group leveraged an unprotected webcam to deploy its payload, evading the defenses of

Possible breach at Ukraine’s Ministry of Foreign Affairs: the Qilin Ransomware group claims responsibility for the attack
The Qilin Ransomware group claims to have compromised the systems of Ukraine’s Ministry of Foreign Affairs, stealing private correspondence, personal information, and official decrees. According to the attackers, some of this data has already been sold to third parties. At

A New Dark Actor Enters the Criminal Underground. Discovering Skira Ransomware
During our reconnaissance into the underground world and criminal groups conducted by Red Hot Cyber’s threat intelligence laboratory DarkLab, we stumbled upon a Data Leak Site of a cyber gang never monitored before: Skira. Ransomware groups generally operate under the

Analysis of Recorded Future’s CVE Report – February 2025
The monthly Recorded Future CVE report for February 2025 provides a detailed overview of current cybersecurity threats, highlighting a slight decline compared to the previous month. A total of 25 high-impact vulnerabilities were identified, down from 33 in January, yet

Android Under Attack: Godfather Malware Now Uses Virtualization to Fool Everyone
Redazione RHC - June 22nd, 2025
A new version of Android malware Godfather has been discovered that creates isolated virtual environments on mobile devices to steal data from banking applications. Recall that Godfather was first discovered in March...

ChatGPT is Shutting Down Our Brains! Alarming MIT Research Shows Mental Decay
Redazione RHC - June 22nd, 2025
During a RHC Conference, Corrado Giustozzi underlined a truth as simple as it is powerful: “Human beings have always been creators of amplifiers.”. From the wheel to the car, every...

AKIRA emergency report: the ransomware that is breaching Italy
RHC Dark Lab - June 22nd, 2025
Spring 2025 will be remembered as a turning point in our country's cyber chronicle. As bulletins and technical releases follow one another, one fact emerges glaringly: AKIRA has entered the...

RHC GhostSec interview: hacktivism in the shadows of terrorism and cyber conflict
RHC Dark Lab - June 12th, 2025
Ghost Security, also known as GhostSec, is a hacktivist group which emerged in the context of the cyber war against Islamic extremism. The first actions of the group date back...
Sign up for the newsletter