Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

970x120 Enterprise 1
Precedente Successivo

Latest news

Microsoft accused by Ron Wyden of cybersecurity negligence Cybercrime

Microsoft accused by Ron Wyden of cybersecurity negligence

US Senator Ron Wyden sent a letter on September 10 to the Federal Trade Commission (FTC) requesting an investigation into...
Pietro Melillo - September 16, 2025
EvilAI: Malware that uses artificial intelligence to bypass security Cyber News

EvilAI: Malware that uses artificial intelligence to bypass security

A new EvilAI malware campaign tracked by Trend Micro has demonstrated how artificial intelligence is increasingly becoming a tool for...
Massimiliano Brolli - September 15, 2025
There’s no antivirus to protect you! ModStealer affects Windows, macOS, and Linux. Cyber News

There’s no antivirus to protect you! ModStealer affects Windows, macOS, and Linux.

Mosyle has discovered a new malware program called ModStealer. The program is completely undetectable by antivirus solutions and was first...
Sandro Sana - September 15, 2025
BitLocker in the crosshairs: stealth attacks via COM hijacking. Online PoC Cyber News

BitLocker in the crosshairs: stealth attacks via COM hijacking. Online PoC

An innovative tool known as BitlockMove has been introduced, which highlights a novel lateral movement technique. This PoC leverages DCOM...
Manuel Roccon - September 15, 2025
From image theft to deepfakes: the new frontier of digital manipulation Cybercrime

From image theft to deepfakes: the new frontier of digital manipulation

In recent months, I've repeatedly found myself filing complaints about fake videos circulating online. We're not just talking about stolen...
Paolo Galdieri - September 15, 2025
The ChillyHell backdoor returns to threaten macOS systems. Cyber News

The ChillyHell backdoor returns to threaten macOS systems.

Researchers have reported a new surge in activity for ChillyHell, a modular backdoor for macOS that was thought to be...
Redazione RHC - September 15, 2025

Hacker gang OPERA1ER stole $11 million from African companies

Amsterdam, 07.11.2022 — Group-IB has today issued a new report, “OPERA1ER. Playing God without permission,” in collaboration withthe researchers from Orange CERT Coordination Center. The report takes a deep dive into financially motivated attacks of...

The Inventor of the P101 explains to us why Italy is destined to be a perennial “follower”

Author: Massimiliano BrolliOriginal Publication Date: 12/12/2020Translator: Tara Lie Pier Giorgio Perotto (for those who do not know of him) was an Italian electronics pioneer. In the 60’s he worked for Olivetti,...
lockbit

RHC interviews LockBit 3.0. “The main thing is not to start a nuclear war”

Translator: Tara Lie We often talk about the LockBit Ransomware-as-a-Service (RaaS) operation, recently remodelled as LockBit 3.0, which continues to bring important innovations to the ransomware cyber circus. Often these new...

Spacewar! The Story of the First Video Game Created by Hackers at MIT

Author: Massimiliano BrolliOriginal Publication Date: 19/03/2021Translator: Tara Lie In this exciting story, we will catapult ourselves back to 1958 to MIT’s Tech Model Railroad Club and meet Steve Russel, Steve was one...

LockBit 3.0: making the ransomware Great Again

LockBit is a major player in the ransomware scene and has contributed heavily for this cyber-crime model to become one of the most popular and imitated in the threats landscape....

The Founding Fathers of the Hacker Community

Author: Massimiliano BrolliOriginal Publication Date: 19/03/2021Translator: Tara Lie Hacker culture was brought to life thanks to computer scientist Richard Greenblatt and mathematician Bill Gosper at the Massachusetts Institute of Technology (MIT). It...

The “Mother of all Demos”. Douglas Englebart’s Vision of the Future

Author: Massimiliano BrolliOriginal Publication Date: 12/05/2022Translator: Tara Lie The “Mother of all Demos'' is the name retrospectively used by journalist Steven Levy, in his 1994 book ‘Insanely Great’, to describe a revolutionary...

RHC ransomware Data Room – January 2022

Author: Dott. Luca Mella, Cyber Security Expert (founder doubleextortion.com) Translate: Vincenzo Marcovecchio Pubblication Date: 5/02/2022 In recent years, the ransomware phenomenon has been so disruptive that it heavily influences the...

Why privacy does not exist

Privacy, privacy, privacy, ... privacy comes first. How many times have we heard this sentence? Yes, because we talk a lot about this topic, we talk about it at work,...

Electronic warfare between the USA, China, South and North Korea (part two)

Author: Olivia TerragniPubblication Date: 13/12/2021 Given that North Korean cyberattacks are not a future threat, but already a FACT, we are already wondering how to deal with the election of...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE