Red Hot Cyber. The Cybersecurity Blog

Fortinet Issues Bulletin for Critical 9.8 Bug on FortiManager under Active Exploitation
Recently, Fortinet disclosed a critical vulnerability, identified as CVE-2024-47575, affecting FortiManager. This is a missing authentication vulnerability for critical functions [CWE-306] in the FortiManager fgfmd daemon, which could allow an unauthenticated remote attacker to execute arbitrary code or commands via

US Elections and psy-ops: main threats come from Digital Echo Chambers and erosion of trust in democratic processes
On November 5th, 2024, the next President and Vice President of the United States of America will be elected, as well as 1/3 of the U.S. Senators and all 435 Members of the U.S. House of Representatives will be chosen.

T-Space Architects Potentially Targeted by Cicada3301 in Data Broker Ransomware Attack
London-based architectural firm T-Space Architects may find itself at the center of a significant cyberattack. The ransomware group Cicada3301 has reportedly added T-Space to its growing list of victims, threatening to expose 50 GB of sensitive company data. If the

Stormous claims an attack on NASA
In recent years, the landscape of cyber threats has been dominated by increasingly sophisticated ransomware groups. Among them, the ransomware group Stormous has gained notoriety for targeting high-profile organizations, including government entities and technology companies. On October 5, 2024, information

The Story Of Conti Ransomware – Origins and Evolution of the RaaS Model (Episode 1)
Ransomware, a malware designed to encrypt data making them restorable only with the use of a private key. Relatively simple math is all that threat actors out there needs to disrupt networks around the globe, once lock out you can

RHC Interviews Lynx Ransomware. The cyber-gang offering Pentest services ensuring privacy
In July 2024, the Lynx group burst into the RaaS world, which from the outset demonstrated above-average aggressiveness and success in attacks with a total of 22 victims featured on their Data Leak Site (also available in the clearnet). Lynx’s

Crazyhunter: The Ransomware with the Three-Dimensional Data Annihilation System That Redefines Data Destruction
Pietro Melillo - March 10th, 2025
In the reconnaissance of the world of the underground and criminal groups carried out by Red Hot Cyber's DarkLab threat intelligence lab, we came across a Data Leak Site of...

Interviewing ChatGPT: the AI that feels human, to its Asperger’s users.
Ashleigh Crause - March 7th, 2025
Have you ever experienced that ChatGPT recognizes who it is talking to? I share my ChatGPT account with my spouse, and when he uses it, he gets the generic, prepackaged...

Akira Ransomware: The New Threat Using Webcams as Entry Points
Pietro Melillo - March 7th, 2025
Akira represents one of the most recent ransomware threats capable of bypassing traditional organizational defense mechanisms. A recent case analyzed by the S-RM team highlighted how this group leveraged an...

Possible breach at Ukraine’s Ministry of Foreign Affairs: the Qilin Ransomware group claims responsibility for the attack
Pietro Melillo - March 7th, 2025
The Qilin Ransomware group claims to have compromised the systems of Ukraine’s Ministry of Foreign Affairs, stealing private correspondence, personal information, and official decrees. According to the attackers, some of...
Sign up for the newsletter