Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Banner Mobile
TM RedHotCyber 970x120 042543

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Volkswagen is investing in artificial intelligence: one billion euros to reduce costs Cybercrime

Volkswagen is investing in artificial intelligence: one billion euros to reduce costs

Volkswagen announced on the first day of the IAA Mobility international trade fair in Munich its intention to integrate artificial...
Redazione RHC - 11 September 2025
A bug in Google Drive allows access to other people’s files on shared desktops. Cybercrime

A bug in Google Drive allows access to other people’s files on shared desktops.

Millions of people and businesses rely on Google Drive to store contracts, reports, photos, and work documents, using the Windows...
Redazione RHC - 11 September 2025
Former WhatsApp employee: “1,500 engineers have access to confidential user data.” Cybercrime

Former WhatsApp employee: “1,500 engineers have access to confidential user data.”

Attaullah Baig, who reportedly led WhatsApp's security team from 2021 to 2025, has filed a lawsuit against parent company Meta....
Redazione RHC - 11 September 2025
iCloud Calendar Phishing Scam: How It Works and How to Protect Yourself Cybercrime

iCloud Calendar Phishing Scam: How It Works and How to Protect Yourself

It has been discovered that iCloud Calendar invitations have been used to send phishing emails disguised as purchase notifications directly...
Redazione RHC - 11 September 2025
Critical BitLocker Vulnerabilities: Microsoft Patches Two Security Holes Cybercrime

Critical BitLocker Vulnerabilities: Microsoft Patches Two Security Holes

Two significant elevation of privilege vulnerabilities affecting Windows BitLocker encryption have been addressed by Microsoft. These flaws, identified as CVE-2025-54911...
Redazione RHC - 11 September 2025
LockBit 5.0: concrete signs of a possible rebirth? Cybercrime

LockBit 5.0: concrete signs of a possible rebirth?

The ransomware landscape continues to be characterized by dynamics of adaptation and resilience. Even when an international operation seems to...
Pietro Melillo - 11 September 2025

NightSpire: A New Player in the Ransomware Landscape

During our reconnaissance into the underground world and criminal groups conducted by Red Hot Cyber's threat intelligence laboratory DarkLab, we stumbled upon a Data Leak Site of a cyber gang...
Share on Facebook Share on LinkedIn Share on X

Crazyhunter: The Ransomware with the Three-Dimensional Data Annihilation System That Redefines Data Destruction

In the reconnaissance of the world of the underground and criminal groups carried out by Red Hot Cyber's DarkLab threat intelligence lab, we came across a Data Leak Site of...
Share on Facebook Share on LinkedIn Share on X

Interviewing ChatGPT: the AI that feels human, to its Asperger’s users.

Have you ever experienced that ChatGPT recognizes who it is talking to? I share my ChatGPT account with my spouse, and when he uses it, he gets the generic, prepackaged...
Share on Facebook Share on LinkedIn Share on X

Akira Ransomware: The New Threat Using Webcams as Entry Points

Akira represents one of the most recent ransomware threats capable of bypassing traditional organizational defense mechanisms. A recent case analyzed by the S-RM team highlighted how this group leveraged an...
Share on Facebook Share on LinkedIn Share on X

Possible breach at Ukraine’s Ministry of Foreign Affairs: the Qilin Ransomware group claims responsibility for the attack

The Qilin Ransomware group claims to have compromised the systems of Ukraine’s Ministry of Foreign Affairs, stealing private correspondence, personal information, and official decrees. According to the attackers, some of...
Share on Facebook Share on LinkedIn Share on X

A New Dark Actor Enters the Criminal Underground. Discovering Skira Ransomware

During our reconnaissance into the underground world and criminal groups conducted by Red Hot Cyber's threat intelligence laboratory DarkLab, we stumbled upon a Data Leak Site of a cyber gang...
Share on Facebook Share on LinkedIn Share on X

Analysis of Recorded Future’s CVE Report – February 2025

The monthly Recorded Future CVE report for February 2025 provides a detailed overview of current cybersecurity threats, highlighting a slight decline compared to the previous month. A total of 25...
Share on Facebook Share on LinkedIn Share on X

Alleged Cyber Attack on Dana Pensiun Bank Mandiri

Alleged Cyber Attack on Dapenbankmandiri.co.id A well-known threat actor, using the alias "LordVoldemort," has claimed on an underground forum to be in possession of an alleged data set belonging to...
Share on Facebook Share on LinkedIn Share on X

Microsoft presents Majorana 1: The Quantum Processor Promising to Reshape the Future

Microsoft has taken a significant step forward in the field of quantum computing with the launch of its first quantum processor: Majorana 1. Unlike most quantum chips that are based...
Share on Facebook Share on LinkedIn Share on X

Linkc Ransomware: The New Cybercriminal Group Targeting Artificial Intelligence Data

In the DarkLab group's underground analysis activity, we ventured onto an onion site that is apparently a Data Leak Site (DLS) of a new ransomware cyber gang. This new actor...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Villager Framework: AI-Powered Penetration Testing Tool
Redazione RHC - 26/12/2025

Straiker’s AI Research (STAR) team has identified Villager, a native AI-based penetration testing framework developed by the Chinese group Cyberspike . The tool, presented as a red team solution , is designed to fully automate…

Immagine del sitoCybercrime
A $500 Tool Claims to Kill EDRs at Kernel Level: Inside the NtKiller Underground Ad
Redazione RHC - 25/12/2025

An ad has surfaced on a closed underground forum frequented by malware operators and initial access brokers, attracting the attention of the cyber threat intelligence community. The post promotes “NtKiller,” a supposed “kernel-level” utility designed…

Immagine del sitoCybercrime
Webrat Malware Targets Security Researchers with GitHub Exploit Traps
Redazione RHC - 24/12/2025

There’s a specific moment, almost always at night, when curiosity overtakes caution. A newly opened repository, few stars but a success. very high score, the README file is well written enough to seem real. This…

Immagine del sitoCybercrime
A backdoor in NVIDIA code. Three 9.8 bugs plague AI and robotics development systems
Redazione RHC - 24/12/2025

When it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it for maintenance purposes or for…

Immagine del sitoCybercrime
La Poste Hit by Pro-Russian DDoS Attack During Peak Holiday Season
Redazione RHC - 23/12/2025

According to internal sources at RedHotCyber , the digital offensive that is causing problems for the National Postal System in France has been officially claimed by the pro-Russian hacker collective NoName057(16). Analysts confirm that the…