Red Hot Cyber. The Cybersecurity Blog

The Story Of Conti Ransomware – Origins and Evolution of the RaaS Model (Episode 1)
Ransomware, a malware designed to encrypt data making them restorable only with the use of a private key. Relatively simple math is all that threat actors out there needs to disrupt networks around the globe, once lock out you can

RHC Interviews Lynx Ransomware. The cyber-gang offering Pentest services ensuring privacy
In July 2024, the Lynx group burst into the RaaS world, which from the outset demonstrated above-average aggressiveness and success in attacks with a total of 22 victims featured on their Data Leak Site (also available in the clearnet). Lynx’s

Alleged SpaceX Database Breach Published on BreachForums
A recent post on a dark web forum has caught the attention of the international cybersecurity community. A user, identified by the nickname l33tfg, claimed to have published a supposed data leak from SpaceX, the aerospace company owned by Elon

WhiteHouse.gov Data Breach: Threat Actors Leak Sensitive Information!
Recently, a threat actor on a dark web forum has posted a claim regarding an alleged data breach involving WhiteHouse.gov. The post, made by a user named “l33tfg,” asserts that sensitive information from the White House’s official website has been

RHC interviews Qilin Ransomware! “Let’s play fair and wait for a worthy opponent on the field”
Qilin (from Chinese :麒麟) is a legendary creature that appears in Chinese mythology and is said to appear with the imminent arrival or demise of a sage or illustrious ruler. The Qilin ransomware is a prime example of the growing

Navigating the future: a dialogue on human resilience and preservation
Participants: NewPlato: Greetings, esteemed colleagues. Today, we embark on a profound dialogue about the future of humanity, particularly focusing on the cyclical nature of civilizations and the means to preserve our collective well-being. NewAlcibiades, you’ve projected significant challenges around the

Akira Ransomware: The New Threat Using Webcams as Entry Points
Pietro Melillo - March 7th, 2025
Akira represents one of the most recent ransomware threats capable of bypassing traditional organizational defense mechanisms. A recent case analyzed by the S-RM team highlighted how this group leveraged an...

Possible breach at Ukraine’s Ministry of Foreign Affairs: the Qilin Ransomware group claims responsibility for the attack
Pietro Melillo - March 7th, 2025
The Qilin Ransomware group claims to have compromised the systems of Ukraine’s Ministry of Foreign Affairs, stealing private correspondence, personal information, and official decrees. According to the attackers, some of...

A New Dark Actor Enters the Criminal Underground. Discovering Skira Ransomware
Pietro Melillo - March 7th, 2025
During our reconnaissance into the underground world and criminal groups conducted by Red Hot Cyber's threat intelligence laboratory DarkLab, we stumbled upon a Data Leak Site of a cyber gang...

Analysis of Recorded Future’s CVE Report – February 2025
Sandro Sana - March 5th, 2025
The monthly Recorded Future CVE report for February 2025 provides a detailed overview of current cybersecurity threats, highlighting a slight decline compared to the previous month. A total of 25...
Sign up for the newsletter