Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

Red Hot Cyber. The Cybersecurity Blog

- June 27th, 2025 - (Posted in Cybercrime and Darknet)
An unusual example of malicious code has been discovered in a real computing environment, which for the first time recorded an attempt to attack not classical defense mechanisms, but directly artificial intelligence systems. We are talking about the prompt injection technique, i.e. the introduction of hidden instructions capable of compromising...
Cybercrime and Darknet

WhiteHouse.gov Data Breach: Threat Actors Leak Sensitive Information!

Recently, a threat actor on a dark web forum has posted a claim regarding an alleged data breach involving WhiteHouse.gov. The post, made by a user named “l33tfg,” asserts that sensitive information from the White House’s official website has been

Cybercrime and Darknet

Navigating the future: a dialogue on human resilience and preservation

Participants: NewPlato: Greetings, esteemed colleagues. Today, we embark on a profound dialogue about the future of humanity, particularly focusing on the cyclical nature of civilizations and the means to preserve our collective well-being. NewAlcibiades, you’ve projected significant challenges around the

Akira Ransomware: The New Threat Using Webcams as Entry Points

- March 7th, 2025

Akira represents one of the most recent ransomware threats capable of bypassing traditional organizational defense mechanisms. A recent case analyzed by the S-RM team highlighted how this group leveraged an...

  

Possible breach at Ukraine’s Ministry of Foreign Affairs: the Qilin Ransomware group claims responsibility for the attack

- March 7th, 2025

The Qilin Ransomware group claims to have compromised the systems of Ukraine’s Ministry of Foreign Affairs, stealing private correspondence, personal information, and official decrees. According to the attackers, some of...

  

A New Dark Actor Enters the Criminal Underground. Discovering Skira Ransomware

- March 7th, 2025

During our reconnaissance into the underground world and criminal groups conducted by Red Hot Cyber's threat intelligence laboratory DarkLab, we stumbled upon a Data Leak Site of a cyber gang...

  

Analysis of Recorded Future’s CVE Report – February 2025

- March 5th, 2025

The monthly Recorded Future CVE report for February 2025 provides a detailed overview of current cybersecurity threats, highlighting a slight decline compared to the previous month. A total of 25...

  

Sign up for the newsletter