Red Hot Cyber. The Cybersecurity Blog
Salesloft Cyber Attack: Chatbot Drift Temporarily Disabled
Salesloft announced that it would temporarily deactivate its AI-powered chatbot Drift on September 5, after several companies were hit by a massive supply chain attack. The incident resulted in the ma...
Discover the Dark Web: Access, Secrets, and Helpful Links to the Onion Network
The Dark Web is a part of the internet that cannot be reached with standard browsers (Chrome, Firefox, Edge). To access it, you need to use specific tools like the Tor Browser, which guarantees anonym...
AI A2 detected 102 0-day bugs and created exploits in Android apps for $1.77
Artificial intelligence systems have been criticized for creating confusing vulnerability reports and inundating open-source developers with irrelevant complaints. But researchers at Nanjing Universit...
$16 billion in stolen Apple, Meta, and Google credentials up for sale for $121,000
The Darklab team, Red Hot Cyber‘s community of threat intelligence experts, has identified an ad on the dark web marketplace “Tor Amazon”, the criminal counterpart of the popular e-commerce site on th...
Red Hot Cyber Conference 2026: Sponsorships Open for the Fifth Edition in Rome
The Red Hot Cyber Conference has become a regular event for the Red Hot Cyber community and for anyone working in or interested in the world of digital technologies and cybersecurity. The fifth editio...
Hexstrike AI unleashes chaos! Zero-days exploited in record time
The release of Hexstrike-AI marks a turning point in the cybersecurity landscape. The framework, billed as a next-generation tool for red teams and researchers, is capable of orchestrating over 150 sp...
LockBit 5.0: Signs of a New and Possible “Rebirth”?
LockBit represents one of the longest-running and most structured ransomware gangs of recent years, with a Ransomware-as-a-Service (RaaS) model that has profoundly impacted the criminal ecosystem. Fol...
The KING of DDoS! Cloudflare blocks a monstrous 11.5 terabit-per-second attack.
The record for the largest DDoS attack ever recorded in June 2025 has already been broken. Cloudflare said it recently blocked the largest DDoS attack in history, which peaked at 11.5 Tbps. “Cloudflar...
Palo Alto Networks Also Compromised via Salesforce and Drift
In early September 2025, Palo Alto Networks confirmed it had been the victim of a data breach. The compromise did not affect its core products or services, but rather some internally used Salesforce i...
Was there terror on Ursula von der Leyen’s flight? Let’s clear things up!
On August 31, 2025, flight AAB53G, operated by a Dassault Falcon 900LX registered OO-GPE and carrying European Commission President Ursula von der Leyen, took off from Warsaw and landed safely at Plov...
Featured Articles

Salesloft announced that it would temporarily deactivate its AI-powered chatbot Drift on September 5, after several companies were hit by a massive supply chain attack. The incident resulted in the ma...

The Dark Web is a part of the internet that cannot be reached with standard browsers (Chrome, Firefox, Edge). To access it, you need to use specific tools like the Tor Browser, which guarantees anonym...

Artificial intelligence systems have been criticized for creating confusing vulnerability reports and inundating open-source developers with irrelevant complaints. But researchers at Nanjing Universit...

The Darklab team, Red Hot Cyber‘s community of threat intelligence experts, has identified an ad on the dark web marketplace “Tor Amazon”, the criminal counterpart of the popular e-commerce site...

The Red Hot Cyber Conference has become a regular event for the Red Hot Cyber community and for anyone working in or interested in the world of digital technologies and cybersecurity. The fifth editio...
Cybercriminals exploit ARC popularity to spread Poseidon Malware : Mac users are the target!
Possible Data Breach Affecting TÜV Rheinland AG
Juniper Networks Releases Security Updates for a Critical 10.0 Vulnerability
Allegedly Data Breach: Kemenkumham Email Credentials Compromised
Coinbase USA: Threat Actor Claims to Sell Database of 600,000 Users
A Brief History of Artificial Intelligence: From Alan Turing to Generative AI

Cybercriminals exploit ARC popularity to spread Poseidon Malware : Mac users are the target!
Raffaela Crisci - July 1st, 2024
In teh last months Mac users have been targeted by a new wave of cyberattack trough malvertising campaigns. The last threat, called “Poseidon” by their creators, has been revealed this...

Possible Data Breach Affecting TÜV Rheinland AG
Pietro Melillo - July 1st, 2024
Recently, TÜV Rheinland AG, one of the leading global certification and inspection companies, has appeared on the data leak site of the ransomware group RansomEXX. At present, there are no...

Juniper Networks Releases Security Updates for a Critical 10.0 Vulnerability
Pietro Melillo - July 1st, 2024
Juniper Networks has recently announced the release of out-of-band security updates to address a severe vulnerability that could lead to an authentication bypass in some of its routers. This vulnerability,...

Allegedly Data Breach: Kemenkumham Email Credentials Compromised
Pietro Melillo - July 1st, 2024
A significant data breach has involved the Ministry of Law and Human Rights (Kemenkumham) in Indonesia. According to a post on a hacker forum, a threat actor under the pseudonym...

Coinbase USA: Threat Actor Claims to Sell Database of 600,000 Users
Pietro Melillo - July 1st, 2024
In the past few hours, a new and alarming cyber threat has emerged. A threat actor has claimed to possess and intends to sell a database containing information on 600,000...

A Brief History of Artificial Intelligence: From Alan Turing to Generative AI
Redazione RHC - June 30th, 2024
Artificial Intelligence (AI) is in the Spotlight Today, Generating Unprecedented Interest and Debate. However, it's important to recognize that this revolutionary technology has a rich history spanning over seventy years...
Sign up for the newsletter