Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Redhotcyber Banner Sito 320x100px Uscita 101125
970x120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Telegram as a Command & Control Platform for Criminal Activities and the Role of Threat Intelligence Cybercrime

Telegram as a Command & Control Platform for Criminal Activities and the Role of Threat Intelligence

In today's cybersecurity landscape, one of the most worrying trends is the abuse of legitimate messaging platforms for malicious purposes....
Redazione RHC - 8 September 2025
Houthi threat or mysterious incident? The Red Sea paralyzes Asia and the Middle East. Cybercrime

Houthi threat or mysterious incident? The Red Sea paralyzes Asia and the Middle East.

As we reported this morning, several undersea cables in the Red Sea have been severed, causing internet access delays and...
Redazione RHC - 7 September 2025
Fired by the AI She Helped Create: The Shocking Story of Katherine Sullivan Cybercrime

Fired by the AI She Helped Create: The Shocking Story of Katherine Sullivan

In Australia, a 65-year-old bank employee was fired after the introduction of artificial intelligence, despite having contributed to its development....
Redazione RHC - 7 September 2025
Salesloft Cyber Attack: Chatbot Drift Temporarily Disabled Cybercrime

Salesloft Cyber Attack: Chatbot Drift Temporarily Disabled

Salesloft announced that it would temporarily deactivate its AI-powered chatbot Drift on September 5, after several companies were hit by...
Redazione RHC - 7 September 2025
Toha Arrest: The Future of the Black Market After XSS Shuts Down Cybercrime

Toha Arrest: The Future of the Black Market After XSS Shuts Down

The arrest of the alleged administrator of the Russian-language forum XSS[.]is, nicknamed Toha, has become a turning point for the...
Redazione RHC - 7 September 2025
Digital blackout: Broken undersea cables in the Red Sea slow down Microsoft’s cloud. Cybercrime

Digital blackout: Broken undersea cables in the Red Sea slow down Microsoft’s cloud.

On Saturday, Microsoft reported issues with its Azure cloud platform due to the breakage of several international undersea cables in...
Redazione RHC - 7 September 2025

Hospitals tremble! Ransomcortex arrives. ransomware gang targeting healthcare facilities

Recently, the landscape of cyber threats has been enriched by the emergence of a new ransomware group named "Ransomcortex". This group is distinguished by its specialization in attacking healthcare facilities,...
Share on Facebook Share on LinkedIn Share on X

RHC interviews Vanir Group. Former affiliates of LockBit, Karakurt and Knight united to extort money: ‘Hire professionals, don’t be cheap’

New threat actors often emerge every day to destabilize the digital foundations of organizations around the world. One of the most recent and disturbing cybergangs uncovered by Darklab of Red...
Share on Facebook Share on LinkedIn Share on X

End of an Era: SiegedSec, the Hacker Group, Announces Its Dissolution

The cybercriminal group SiegedSec, which gained notoriety during Russia's invasion of Ukraine, has recently announced its dissolution. This group, led by "YourAnonWolf," quickly consolidated its power by increasing the number...
Share on Facebook Share on LinkedIn Share on X

Alleged Data Breach of the United States Department of Defense and National Security Agency

Recently, alarming news has emerged on a well-known underground forum regarding alleged data breaches of the United States Department of Defense and the National Security Agency (NSA). The announcements, posted...
Share on Facebook Share on LinkedIn Share on X

New Ransomware Group “Vanir Group”: Three Victims Immediately in Their Data Leak Site

A new ransomware group, calling themselves "Vanir Group," has recently made its debut in the cybercrime landscape. This group has quickly garnered attention for the aggressiveness and professionalism of their...
Share on Facebook Share on LinkedIn Share on X

Meow ransomware claims attack in its Data Leak Site at HPE giant

Introduction Today, the ransomware gang known as Meow has claimed responsibility for a cyberattack on the multinational giant Hewlett Packard Enterprise (HPE). The claim was published on their Data Leak...
Share on Facebook Share on LinkedIn Share on X

The Threat Actor 888 claimed a compromise against Microsoft

On July 9, 2024, a user known as "888" posted on BreachForums claiming to have leaked sensitive data of Microsoft employees. This alleged breach has exposed personal information of 2,073...
Share on Facebook Share on LinkedIn Share on X

The Threat Actor 888 claims responsibility for a breach at Nokia.

A malicious actor, known by the alias "888," recently claimed responsibility for disclosing sensitive data belonging to Nokia. The attack, which occurred in July 2024, compromised a wide range of...
Share on Facebook Share on LinkedIn Share on X

Citrix Netscaler ADC and Gateway plagued by serious DOS and Open Redirect flaw

Two vulnerabilities have been identified in NetScaler ADC and NetScaler Gateway. Affected Versions: The following supported versions of NetScaler ADC and NetScaler Gateway are vulnerable: These devices are widely used...
Share on Facebook Share on LinkedIn Share on X

Massive Data Exposure on X (Twitter) Affects 200 Million Users

Recently, X (Twitter) experienced a massive data exposure, compromising nearly 200 million user records. This incident could be one of the largest user data exposures in recent history, jeopardizing the...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Cyber Criminals Recruit Insiders: Companies at Risk of Internal Threats
Redazione RHC - 27/12/2025

The cybercriminal community is rapidly increasing its interest in recruiting personnel from within companies . Instead of sophisticated external attacks, criminals are increasingly relying on internal sources— people willing to provide access to company systems…

Immagine del sitoCybercrime
Villager Framework: AI-Powered Penetration Testing Tool
Redazione RHC - 26/12/2025

Straiker’s AI Research (STAR) team has identified Villager, a native AI-based penetration testing framework developed by the Chinese group Cyberspike . The tool, presented as a red team solution , is designed to fully automate…

Immagine del sitoCybercrime
A $500 Tool Claims to Kill EDRs at Kernel Level: Inside the NtKiller Underground Ad
Redazione RHC - 25/12/2025

An ad has surfaced on a closed underground forum frequented by malware operators and initial access brokers, attracting the attention of the cyber threat intelligence community. The post promotes “NtKiller,” a supposed “kernel-level” utility designed…

Immagine del sitoCybercrime
Webrat Malware Targets Security Researchers with GitHub Exploit Traps
Redazione RHC - 24/12/2025

There’s a specific moment, almost always at night, when curiosity overtakes caution. A newly opened repository, few stars but a success. very high score, the README file is well written enough to seem real. This…

Immagine del sitoCybercrime
A backdoor in NVIDIA code. Three 9.8 bugs plague AI and robotics development systems
Redazione RHC - 24/12/2025

When it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it for maintenance purposes or for…