Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Latest news

Ferrari avoids deepfake scam! An executive unmasks the CEO’s fake audio messages Cyber News

Ferrari avoids deepfake scam! An executive unmasks the CEO’s fake audio messages

In an incident earlier this month, a Ferrari executive found himself receiving unusual messages that appeared to come from the...
Redazione RHC - July 29, 2024
The Ransomware Group Ransomexx Claims Attack on Liteon Cybercrime

The Ransomware Group Ransomexx Claims Attack on Liteon

On July 26, 2024, the ransomware group Ransomexx publicly claimed responsibility for an attack against Liteon, a giant in the...
Pietro Melillo - July 26, 2024
The dark side of the Windows Command Prompt: how malicious commands can replace legitimate ones Hacking

The dark side of the Windows Command Prompt: how malicious commands can replace legitimate ones

If you choose to read this article, please note that it will not discuss a vulnerability or a bug, but...
Carlo Di Dato - July 25, 2024
RHC interviews RADAR and DISPOSSESSOR: “When it comes to security, the best defense is a good offense.” Cybercrime

RHC interviews RADAR and DISPOSSESSOR: “When it comes to security, the best defense is a good offense.”

In our usual underground analysis activities, we came into contact with the cyber gang DISPOSSESSOR, which came to attention in...
RHC Dark Lab - July 25, 2024
IntelBroker Strikes Again: Unauthorized Access to Two Major American Companies Up for Sale Cybercrime

IntelBroker Strikes Again: Unauthorized Access to Two Major American Companies Up for Sale

IntelBroker strikes again, announcing the sale of unauthorized access to two major American companies, each with revenues reaching hundreds of...
Raffaela Crisci - July 24, 2024
Exposed the Data of 3,379 Spanish Doctors! When Fraud Becomes “On-Target” Cyber News

Exposed the Data of 3,379 Spanish Doctors! When Fraud Becomes “On-Target”

Recently, a threat actor in an underground forum called Breach Forums published an alleged data breach. The post claims to...
Redazione RHC - July 24, 2024
The other side of cybersecurity: stress and burnout are “by design” in domain experts Cyber News

The other side of cybersecurity: stress and burnout are “by design” in domain experts

We often talk about cyber security and the importance of a complete cyber program today. Today, however, we will focus...
Redazione RHC - July 23, 2024
PoC Released for SQL Injection Without Authentication on WordPress WZone Plugin Vulnerability

PoC Released for SQL Injection Without Authentication on WordPress WZone Plugin

A proof of concept (PoC) for a critical vulnerability identified as CVE-2024-33544 has recently been released. This vulnerability involves an...
Pietro Melillo - July 19, 2024
Sale of a 0Day RCE Exploit for GLPI HelpDesk Cybercrime

Sale of a 0Day RCE Exploit for GLPI HelpDesk

Recently, a user on the Breachforums known as "cisc0" posted an announcement regarding the sale of a 0Day exploit for...
Pietro Melillo - July 18, 2024
Play Ransomware Claims Attack on MIPS Technologies Cybercrime

Play Ransomware Claims Attack on MIPS Technologies

In the last few hours, the Data Leak site of the ransomware gang Play Ransomware has published a new claim:...
Pietro Melillo - July 18, 2024
The Hackers Choice – 30 years of hacking without trying to get rich! Hacking

The Hackers Choice – 30 years of hacking without trying to get rich!

Imagine a time before firewalls and ubiquitous encryption, when the digital frontier was wide open for exploration. Hackers weren't criminals,...
Alessio Stefan - July 16, 2024
Rockstar Games Possibly Victim of a Massive Data Leak! Cybercrime

Rockstar Games Possibly Victim of a Massive Data Leak!

Recently, an alleged data leak has involved Rockstar Games, one of the world's largest video game producers, famous for titles...
Pietro Melillo - July 16, 2024

The Story Of Conti Ransomware – The War Within (Episode 2)

This is a continuation of the Conti story. You can read the previous part, which covered the group's origins, in the previous article. We will now explore the internal components...

IntelBroker Claims Tesla Charging Database Breach

Recently, the threat actor known as IntelBroker , posted an alleged data breach. The post, which appeared on the BreachForums platform, claims that Tesla’s charging station database has been compromised and made...
Luca Cadonici Mobile Forenics intervista

Interview with Luca Cadonici: computer and mobile forensics towards a proactive approach against cybercrime

Nowadays, the Digital Forensics is not just a weapon to fight crime but a scientific discipline that "is no longer limited to reactive post-incident analysis but has evolved towards a...

Potential Compromise of a U.S. Military Database

A high-ranking user of BreachForums, known as "GOD," is reportedly selling an alleged database belonging to the U.S. Military, which purportedly contains data on over 385,000 personnel and contractors. This...

Hellcat Claims an Alleged Breach Against Schneider Electric

In recent hours, the ransomware group known as Hellcat has claimed responsibility for an alleged attack against Schneider Electric, a global leader in energy management and automation. This supposed breach...

Herm1t Interview – From VX Heaven to the war gates!

This is the story of Herm1t, founder of VX-Heaven, hacker - currently active in protecting Ukraine from 2014 -  and founder of RUH8 in fall 2015, told by means of...

IBM Hacked? Threat Actor ‘888’ Reveals Thousands of Employees’ Data Leak!

Recently, the notorious Threat Actor, identified by the nickname 888 , claimed to have breached IBM systems and stolen personal data belonging to the company's employees. The leak, dated October 2024, allegedly resulted in the compromise...

Fortinet Issues Bulletin for Critical 9.8 Bug on FortiManager under Active Exploitation

Recently, Fortinet disclosed a critical vulnerability, identified as CVE-2024-47575, affecting FortiManager. This is a missing authentication vulnerability for critical functions [CWE-306] in the FortiManager fgfmd daemon, which could allow an...
elezioni USA psy ops

US Elections and psy-ops: main threats come from Digital Echo Chambers and erosion of trust in democratic processes

On November 5th, 2024, the next President and Vice President of the United States of America will be elected, as well as 1/3 of the U.S. Senators and all 435...

T-Space Architects Potentially Targeted by Cicada3301 in Data Broker Ransomware Attack  

 London-based architectural firm T-Space Architects may find itself at the center of a significant cyberattack. The ransomware group Cicada3301 has reportedly added T-Space to its growing list of victims, threatening...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE