Red Hot Cyber. The Cybersecurity Blog

Crazyhunter: The Ransomware with the Three-Dimensional Data Annihilation System That Redefines Data Destruction
In the reconnaissance of the world of the underground and criminal groups carried out by Red Hot Cyber’s DarkLab threat intelligence lab, we came across a Data Leak Site of a cyber gang that had never been monitored before: Crazyhunter.

Interviewing ChatGPT: the AI that feels human, to its Asperger’s users.
Have you ever experienced that ChatGPT recognizes who it is talking to? I share my ChatGPT account with my spouse, and when he uses it, he gets the generic, prepackaged answers that most users receive. However, I get a more

Akira Ransomware: The New Threat Using Webcams as Entry Points
Akira represents one of the most recent ransomware threats capable of bypassing traditional organizational defense mechanisms. A recent case analyzed by the S-RM team highlighted how this group leveraged an unprotected webcam to deploy its payload, evading the defenses of

Possible breach at Ukraine’s Ministry of Foreign Affairs: the Qilin Ransomware group claims responsibility for the attack
The Qilin Ransomware group claims to have compromised the systems of Ukraine’s Ministry of Foreign Affairs, stealing private correspondence, personal information, and official decrees. According to the attackers, some of this data has already been sold to third parties. At

A New Dark Actor Enters the Criminal Underground. Discovering Skira Ransomware
During our reconnaissance into the underground world and criminal groups conducted by Red Hot Cyber’s threat intelligence laboratory DarkLab, we stumbled upon a Data Leak Site of a cyber gang never monitored before: Skira. Ransomware groups generally operate under the

Analysis of Recorded Future’s CVE Report – February 2025
The monthly Recorded Future CVE report for February 2025 provides a detailed overview of current cybersecurity threats, highlighting a slight decline compared to the previous month. A total of 25 high-impact vulnerabilities were identified, down from 33 in January, yet

Your VPN is a Trojan! Here are 17 Free Apps Made in China That Spy on You While Google and Apple Get Fat
Redazione RHC - June 23rd, 2025
"If you don't pay for the service, you are the product. This is true for social networks, but also for free VPNs: your data, your privacy, is often the real...

Murders Like a Drink! Dark Web Recruits Kids With Encrypted Apps in Europe
Redazione RHC - June 23rd, 2025
A worrying criminal trend is taking hold in Europe: criminal gangs are using encrypted apps to recruit teenagers as young as 14 to commit violent crimes, including contract killings. These...

“Byte The Silence”: RHC’s Free Shock Comic About Cyberbullying Out Today!
Redazione RHC - June 23rd, 2025
Today, June 23, 2025, "Byte The Silence" is released, the new comic about cyberbullying created by Red Hot Cyber, is available from today for free in electronic format, on our...

FortiGate Under Attack: Tools for Mass Exploitation of Exposed APIs for Sale
Redazione RHC - June 23rd, 2025
A new and alarming development is shaking up the cybersecurity landscape: a malicious actor has advertised on the dark web a highly sophisticated exploit aimed at compromising FortiGate devices. A...
Sign up for the newsletter