Red Hot Cyber. The Cybersecurity Blog

Alleged Cyber Attack on Dana Pensiun Bank Mandiri
Alleged Cyber Attack on Dapenbankmandiri.co.id A well-known threat actor, using the alias “LordVoldemort,” has claimed on an underground forum to be in possession of an alleged data set belonging to the domain dapenbankmandiri.co.id. According to the post, the compromised data

Microsoft presents Majorana 1: The Quantum Processor Promising to Reshape the Future
Microsoft has taken a significant step forward in the field of quantum computing with the launch of its first quantum processor: Majorana 1. Unlike most quantum chips that are based on electron-based qubits, this revolutionary processor exploits Majorana particles, a

Linkc Ransomware: The New Cybercriminal Group Targeting Artificial Intelligence Data
In the DarkLab group’s underground analysis activity, we ventured onto an onion site that is apparently a Data Leak Site (DLS) of a new ransomware cyber gang. This new actor called Linkc, was the author of a recent heist against

The UK’s Digital Crackdown: how the government is using our online habits to breach human rights
In today’s digital age, the boundaries between lawful expression and governmental overreach are becoming increasingly blurred in the United Kingdom. Citizens are finding themselves under scrutiny, and in some cases, facing legal consequences for their online activities, raising significant concerns

Ransomware Gangs weaponize Windows Defender Application Control (WDAC) to disable EDR products.
In the past days we saw that Ransomware Gangs use WDAC to disable EDR products. I have known this type of attack for a year when a guy posts a similar technique on Twitter, but this is the first time

The Story Of Conti Ransomware – The Last Ceremony (Final Episode)
This is the last episode of “The Story Of Conti Ransomware” series, we would finally reach the decline of the group and what this means for the current ransomware landscape. In the previous article group we have approached operations made

Breadcrumbing: Understanding Emotional Manipulation to Better Defend Yourself in the Digital Domain
Redazione RHC - June 23rd, 2025
This article aims to explore the phenomenon of breadcrumbing from a psychological perspective, metaphorically linking it to the insidious strategies that attackers use in cybersecurity. We will discover how understanding...

Connected and Vulnerable: How to Secure OT and ICS in 2025
Redazione RHC - June 22nd, 2025
In today's interconnected world, cybersecurity is not just about protecting information. Today, most devices and physical tools are connected to the network in some way. Whether for its structural operation...

Darkcloux 3.0 is here: Securonis Linux becomes more secure (and more extreme) than ever
Redazione RHC - June 22nd, 2025
Securonis Linux has released its most significant update: version 3.0 of "Darkcloux" and the 3.0-r1 patch. The release includes new utilities, redesigned components, and improvements to privacy and security. The main change...

Urobot watches you while you pee (but it’s for your own good)
Redazione RHC - June 22nd, 2025
A Taiwanese hospital is testing Urobot, a smart urinal that instantly analyzes urine and emails the results. Although the device is designed in a "cute" style, social media users have...
Sign up for the newsletter