Red Hot Cyber. The Cybersecurity Blog

Interview with Luca Cadonici: computer and mobile forensics towards a proactive approach against cybercrime
Nowadays, the Digital Forensics is not just a weapon to fight crime but a scientific discipline that “is no longer limited to reactive post-incident analysis but has evolved towards a proactive approach, aimed at prevention and threat intelligence”. Specifically, Mobile

Potential Compromise of a U.S. Military Database
A high-ranking user of BreachForums, known as “GOD,” is reportedly selling an alleged database belonging to the U.S. Military, which purportedly contains data on over 385,000 personnel and contractors. This database would have been acquired in November 2024 and is

Hellcat Claims an Alleged Breach Against Schneider Electric
In recent hours, the ransomware group known as Hellcat has claimed responsibility for an alleged attack against Schneider Electric, a global leader in energy management and automation. This supposed breach was reported on Hellcat’s data leak site, where information was

Herm1t Interview – From VX Heaven to the war gates!
This is the story of Herm1t, founder of VX-Heaven, hacker – currently active in protecting Ukraine from 2014 – and founder of RUH8 in fall 2015, told by means of an interview that sought to focus on its history, values

Israeli Air Force Data Sale: A Suspected Leak Puts Sensitive Information at Risk
Recently, a cyber threat actor known as EagleStrike posted an announcement on a dark web forum, claiming to possess confidential data concerning the Israeli Air Force (IAF). According to the post, this collection of information includes critical details about both

IBM Hacked? Threat Actor ‘888’ Reveals Thousands of Employees’ Data Leak!
Recently, the notorious Threat Actor, identified by the nickname 888 , claimed to have breached IBM systems and stolen personal data belonging to the company’s employees. The leak, dated October 2024, allegedly resulted in the compromise of approximately 17,500 rows of data. At this time, we cannot

Paragon Spyware – Let’s talk about privacy and governments
Alessio Stefan - March 18th, 2025
Politics, information technology, and privacy. A triad continually seeking balance with a history of conflict that originates from the introduction of personal computers at the consumer level. Attempts by the...

Beyond the Dark Storm’s attack on X: how hacktivism’s Illusion reinforces the System
Olivia Terragni - March 18th, 2025
The Dark Storm attack on X (formerly Twitter) has been significant for several reasons. The attack on March 10 2025 - a multi-layered Distributed Denial-of-Service (DDoS) using a botnet -...

Babuk Locker 2.0: The New Ransomware Affiliate Program
Pietro Melillo - March 13th, 2025
Babuk, one of the most notorious ransomware groups in cybercrime, has launched the Babuk Locker 2.0 Affiliate Program 2025, an affiliate program for skilled hackers looking to profit from ransomware...

NightSpire: A New Player in the Ransomware Landscape
Pietro Melillo - March 12th, 2025
During our reconnaissance into the underground world and criminal groups conducted by Red Hot Cyber's threat intelligence laboratory DarkLab, we stumbled upon a Data Leak Site of a cyber gang...
Sign up for the newsletter