Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Featured Articles

In Nepal, people are dying for social media! 19 people lost their lives trying to get Facebook back
Di Redazione RHC - 09/09/2025

In a dramatic reversal, Nepal has lifted the nationwide social media blackout imposed last week after it sparked massive youth protests and caused at least 19 deaths, according to local media. The dec...

Xi Jinping and the Chinese APT’s Ambition
Di Alessio Stefan - 08/09/2025

The post-COVID macro political movements, including ongoing conflicts, have prompted a majority of states to shift their medium- to long-term political objectives. Clearly, a paradigm shift has been v...

Salesloft Cyber Attack: Chatbot Drift Temporarily Disabled
Di Redazione RHC - 07/09/2025

Salesloft announced that it would temporarily deactivate its AI-powered chatbot Drift on September 5, after several companies were hit by a massive supply chain attack. The incident resulted in the ma...

Discover the Dark Web: Access, Secrets, and Helpful Links to the Onion Network
Di Redazione RHC - 06/09/2025

The Dark Web is a part of the internet that cannot be reached with standard browsers (Chrome, Firefox, Edge). To access it, you need to use specific tools like the Tor Browser, which guarantees anonym...

AI A2 detected 102 0-day bugs and created exploits in Android apps for $1.77
Di Redazione RHC - 06/09/2025

Artificial intelligence systems have been criticized for creating confusing vulnerability reports and inundating open-source developers with irrelevant complaints. But researchers at Nanjing Universit...

Linkc Ransomware: The New Cybercriminal Group Targeting Artificial Intelligence Data

In the DarkLab group's underground analysis activity, we ventured onto an onion site that is apparently a Data Leak Site (DLS) of a new ransomware cyb...
Pietro Melillo - 20/02/2025 - 18:07

The UK’s Digital Crackdown: how the government is using our online habits to breach human rights


In today's digital age, the boundaries between lawful expression and governmental overreach are becoming increasingly blurred in the United Kingdom. C...
Ashleigh Crause - 12/02/2025 - 19:02

Ransomware Gangs weaponize Windows Defender Application Control (WDAC) to disable EDR products.

In the past days we saw that Ransomware Gangs use WDAC to disable EDR products. I have known this type of attack for a year when a guy posts a simi...
Alex Necula - 13/01/2025 - 17:01

The Story Of Conti Ransomware – The Last Ceremony (Final Episode)

This is the last episode of “The Story Of Conti Ransomware” series, we would finally reach the decline of the group and what this means for the curren...
Alessio Stefan - 08/01/2025 - 07:06

The Fall of the Human Conscience: Programming Desensitization

Author: Ashleigh Crause Is our Obsessive use of technology making us insensitive? “Technology - Ashleigh Crause tells us - is, by far, one of the m...
Olivia Terragni - 04/01/2025 - 17:50

Harley-Davidson Targeted by Cyber ​​Criminals: 888 Claims Data Breach

Recently, a threat actor on an underground forum posted an alleged data breach. According to reports, the famous American company Harley-Davidson h...
RHC Dark Lab - 31/12/2024 - 09:17

Linkc Ransomware: The New Cybercriminal Group Targeting Artificial Intelligence Data

- February 20th, 2025

In the DarkLab group's underground analysis activity, we ventured onto an onion site that is apparently a Data Leak Site (DLS) of a new ransomware cyber gang. This new actor...

  

UK digital Crackdown

The UK’s Digital Crackdown: how the government is using our online habits to breach human rights


- February 12th, 2025

In today's digital age, the boundaries between lawful expression and governmental overreach are becoming increasingly blurred in the United Kingdom. Citizens are finding themselves under scrutiny, and in some cases,...

  

Ransomware Gangs weaponize Windows Defender Application Control (WDAC) to disable EDR products.

- January 13th, 2025

In the past days we saw that Ransomware Gangs use WDAC to disable EDR products. I have known this type of attack for a year when a guy posts a...

  

The Story Of Conti Ransomware – The Last Ceremony (Final Episode)

- January 8th, 2025

This is the last episode of “The Story Of Conti Ransomware” series, we would finally reach the decline of the group and what this means for the current ransomware landscape....

  

The Fall of the Human Conscience

The Fall of the Human Conscience: Programming Desensitization

- January 4th, 2025

Author: Ashleigh Crause Is our Obsessive use of technology making us insensitive? “Technology - Ashleigh Crause tells us - is, by far, one of the most amazing inventions to date”....

  

Harley-Davidson Targeted by Cyber ​​Criminals: 888 Claims Data Breach

- December 31st, 2024

Recently, a threat actor on an underground forum posted an alleged data breach. According to reports, the famous American company Harley-Davidson has been the victim of a data breach that...

  

Sign up for the newsletter