Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

Red Hot Cyber. The Cybersecurity Blog

- June 27th, 2025 - (Posted in Cybercrime and Darknet)
An unusual example of malicious code has been discovered in a real computing environment, which for the first time recorded an attempt to attack not classical defense mechanisms, but directly artificial intelligence systems. We are talking about the prompt injection technique, i.e. the introduction of hidden instructions capable of compromising...
Cybercrime and Darknet

Akira Ransomware: The New Threat Using Webcams as Entry Points

Akira represents one of the most recent ransomware threats capable of bypassing traditional organizational defense mechanisms. A recent case analyzed by the S-RM team highlighted how this group leveraged an unprotected webcam to deploy its payload, evading the defenses of

Android Under Attack: Godfather Malware Now Uses Virtualization to Fool Everyone

- June 22nd, 2025

A new version of Android malware Godfather has been discovered that creates isolated virtual environments on mobile devices to steal data from banking applications. Recall that Godfather was first discovered in March...

  

ChatGPT is Shutting Down Our Brains! Alarming MIT Research Shows Mental Decay

- June 22nd, 2025

During a RHC Conference, Corrado Giustozzi underlined a truth as simple as it is powerful: “Human beings have always been creators of amplifiers.”. From the wheel to the car, every...

  

AKIRA emergency report: the ransomware that is breaching Italy

- June 22nd, 2025

Spring 2025 will be remembered as a turning point in our country's cyber chronicle. As bulletins and technical releases follow one another, one fact emerges glaringly: AKIRA has entered the...

  

RHC GhostSec interview: hacktivism in the shadows of terrorism and cyber conflict

- June 12th, 2025

Ghost Security, also known as GhostSec, is a hacktivist group which emerged in the context of the cyber war against Islamic extremism. The first actions of the group date back...

  

Sign up for the newsletter