Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Latest news

The Story Of Conti Ransomware – Origins and Evolution of the RaaS Model (Episode 1) Cybercrime

The Story Of Conti Ransomware – Origins and Evolution of the RaaS Model (Episode 1)

Ransomware, a malware designed to encrypt data making them restorable only with the use of a private key. Relatively simple...
Alessio Stefan - September 30, 2024
RHC Interviews Lynx Ransomware. The cyber-gang offering Pentest services ensuring privacy Cybercrime

RHC Interviews Lynx Ransomware. The cyber-gang offering Pentest services ensuring privacy

In July 2024, the Lynx group burst into the RaaS world, which from the outset demonstrated above-average aggressiveness and success...
RHC Dark Lab - September 23, 2024
Alleged SpaceX Database Breach Published on BreachForums Cybercrime

Alleged SpaceX Database Breach Published on BreachForums

A recent post on a dark web forum has caught the attention of the international cybersecurity community. A user, identified...
Pietro Melillo - September 21, 2024
RHC interviews Qilin Ransomware! “Let’s play fair and wait for a worthy opponent on the field” Cybercrime

RHC interviews Qilin Ransomware! “Let’s play fair and wait for a worthy opponent on the field”

Qilin (from Chinese :麒麟) is a legendary creature that appears in Chinese mythology and is said to appear with the...
RHC Dark Lab - September 19, 2024
Navigating the future: a dialogue on human resilience and preservation Cybercrime

Navigating the future: a dialogue on human resilience and preservation

Participants: NewPlato: A contemporary philosopher seeking to understand the nature of human civilization and its future. NewSocrates: A wise mentor...
Alessandro Rugolo - September 5, 2024
Cryptography at Risk: MIT develops a Quantum Algorithm to crack RSA. innovation

Cryptography at Risk: MIT develops a Quantum Algorithm to crack RSA.

Modern encryption methods, such as RSA, are based on the fact that even the most powerful classical computers are not...
Tara Lie - August 27, 2024
Arrest of Pavel Durov: Telegram Founder Detained in Paris Cybercrime

Arrest of Pavel Durov: Telegram Founder Detained in Paris

On August 24, 2024, French authorities arrested Pavel Durov, the founder and CEO of Telegram, at Le Bourget Airport. Durov,...
Pietro Melillo - August 25, 2024
IntelBroker Takes Control of BreachForums: A New Chapter in Cybercrime Management Cybercrime

IntelBroker Takes Control of BreachForums: A New Chapter in Cybercrime Management

IntelBroker Takes Control of BreachForums: A New Chapter in Cybercrime Management IntroductionThe recent acquisition of BreachForums by IntelBroker marks a...
Pietro Melillo - August 22, 2024
Donald Trump’s campaign under attack! Documents and internal communications exfiltrated Cyberpolitics

Donald Trump’s campaign under attack! Documents and internal communications exfiltrated

After the European elections unfolded, geopolitical attentions shifted to the U.S. election campaign, one of the most dynamic in recent...
Alessio Stefan - August 11, 2024
NSO Group targeted! BlackMeta attacks Spyware maker’s central domain Cyberpolitics

NSO Group targeted! BlackMeta attacks Spyware maker’s central domain

The Pro-Palestinian group BlackMeta (or DarkMeta) announced on August 1, 2024, on their official telegram channel that they conducted a...
Alessio Stefan - August 4, 2024
Echelon Stealer: The Open Source Malware Vulnerability

Echelon Stealer: The Open Source Malware

Echelon Stealer is an infostealer malware that was first discovered in 2018 and is still active. Currently shared as an...
Pietro Melillo - July 31, 2024
Ferrari avoids deepfake scam! An executive unmasks the CEO’s fake audio messages Cyber News

Ferrari avoids deepfake scam! An executive unmasks the CEO’s fake audio messages

In an incident earlier this month, a Ferrari executive found himself receiving unusual messages that appeared to come from the...
Redazione RHC - July 29, 2024

Microsoft presents Majorana 1: The Quantum Processor Promising to Reshape the Future

Microsoft has taken a significant step forward in the field of quantum computing with the launch of its first quantum processor: Majorana 1. Unlike most quantum chips that are based...

Linkc Ransomware: The New Cybercriminal Group Targeting Artificial Intelligence Data

In the DarkLab group's underground analysis activity, we ventured onto an onion site that is apparently a Data Leak Site (DLS) of a new ransomware cyber gang. This new actor...
UK digital Crackdown

The UK’s Digital Crackdown: how the government is using our online habits to breach human rights


In today's digital age, the boundaries between lawful expression and governmental overreach are becoming increasingly blurred in the United Kingdom. Citizens are finding themselves under scrutiny, and in some cases,...

The Story Of Conti Ransomware – The Last Ceremony (Final Episode)

This is the last episode of “The Story Of Conti Ransomware” series, we would finally reach the decline of the group and what this means for the current ransomware landscape....

FBI responds to threats and announcement of LockBit 4.0

In the last month of 2024, LockBit has been exodusively talked about. The prominent news is the long-awaited release of the 4.0 program of the most famous RaaS in the...

Brain Chiper claims computer attack on Deloitte. 1 Tera Byte of data

At 14:35 today, the claim of a cyber attack on the consulting giant Deloitte was detected on BrainChiper's Data Leak Site. A countdown is active, marking the time for the...

The Exploit for the RCE on Palo Alto Firewalls is now Online! And let the Administration be for all

A few hours ago on Breach Forum, a threat actor by the name “newplzqibeme” shared a GitHub repository where a python-written exploit for active exploitation of CVE-2024-0012 on PanOS (the...

RHC DarkLab Interviews Interlock Ransomware. “Don’t waste your energy and time. We will do it for you.”

RHC DarkLab has always taken a unique and provocative approach in the fight against cyber threats, summed up by the motto: ‘One must know the Demons to learn how to...

How Threat Actor make EDR’s harmless with a reboot

I became aware of this technique like 9 months ago, and now I see this on a attack in the wild conducted by Qilin Ransomware Gang, so it’s time to...

The Story Of Conti Ransomware – The War Within (Episode 2)

This is a continuation of the Conti story. You can read the previous part, which covered the group's origins, in the previous article. We will now explore the internal components...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE