Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
320x100 Olympous
UtiliaCS 970x120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Perl returns to the top 10 most popular programming languages Cybercrime

Perl returns to the top 10 most popular programming languages

TIOBE Software has released its September ranking of the most popular programming languages. The highlight of the publication was Perl's...
Redazione RHC - 17 September 2025
Hacker Scattered LAPSUS$ Hunters: Unauthorized Access to Google LERS Cybercrime

Hacker Scattered LAPSUS$ Hunters: Unauthorized Access to Google LERS

Google executives said that hackers created a fake account on the Law Enforcement Request System (LERS), the company's platform used...
Redazione RHC - 17 September 2025
Chat Control: Between hunting down illegal channels and cracking down on freedom and privacy Cybercrime

Chat Control: Between hunting down illegal channels and cracking down on freedom and privacy

The news is simple, the technology is not. Chat Control (CSAR) was created to uncover CSAM and grooming dynamics within...
Sandro Sana - 16 September 2025
An e-cigarette becomes a web server. And let hacking be! Cybercrime

An e-cigarette becomes a web server. And let hacking be!

Richard Stallman said many years ago "Playfully doing something difficult, whether it's useful or not, that's hacking!" Romanian engineer and...
Redazione RHC - 16 September 2025
Critical Linux Vulnerability: 0-Click N-Days Exploit Allows Remote Code Execution Cybercrime

Critical Linux Vulnerability: 0-Click N-Days Exploit Allows Remote Code Execution

A security researcher recently developed a zero-click exploit for the Linux SMB3 kernel daemon (ksmbd), exploiting two specific vulnerabilities. This...
Redazione RHC - 16 September 2025
Security alert for AI servers: thousands are at risk Cybercrime

Security alert for AI servers: thousands are at risk

Artificial intelligence systems are increasingly under attack. This data emerges from "Trend Micro State of AI Security Report, 1H 2025"....
Redazione RHC - 16 September 2025

Interviewing ChatGPT: the AI that feels human, to its Asperger’s users.

Have you ever experienced that ChatGPT recognizes who it is talking to? I share my ChatGPT account with my spouse, and when he uses it, he gets the generic, prepackaged...
Share on Facebook Share on LinkedIn Share on X

Akira Ransomware: The New Threat Using Webcams as Entry Points

Akira represents one of the most recent ransomware threats capable of bypassing traditional organizational defense mechanisms. A recent case analyzed by the S-RM team highlighted how this group leveraged an...
Share on Facebook Share on LinkedIn Share on X

Possible breach at Ukraine’s Ministry of Foreign Affairs: the Qilin Ransomware group claims responsibility for the attack

The Qilin Ransomware group claims to have compromised the systems of Ukraine’s Ministry of Foreign Affairs, stealing private correspondence, personal information, and official decrees. According to the attackers, some of...
Share on Facebook Share on LinkedIn Share on X

A New Dark Actor Enters the Criminal Underground. Discovering Skira Ransomware

During our reconnaissance into the underground world and criminal groups conducted by Red Hot Cyber's threat intelligence laboratory DarkLab, we stumbled upon a Data Leak Site of a cyber gang...
Share on Facebook Share on LinkedIn Share on X

Analysis of Recorded Future’s CVE Report – February 2025

The monthly Recorded Future CVE report for February 2025 provides a detailed overview of current cybersecurity threats, highlighting a slight decline compared to the previous month. A total of 25...
Share on Facebook Share on LinkedIn Share on X

Alleged Cyber Attack on Dana Pensiun Bank Mandiri

Alleged Cyber Attack on Dapenbankmandiri.co.id A well-known threat actor, using the alias "LordVoldemort," has claimed on an underground forum to be in possession of an alleged data set belonging to...
Share on Facebook Share on LinkedIn Share on X

Microsoft presents Majorana 1: The Quantum Processor Promising to Reshape the Future

Microsoft has taken a significant step forward in the field of quantum computing with the launch of its first quantum processor: Majorana 1. Unlike most quantum chips that are based...
Share on Facebook Share on LinkedIn Share on X

Linkc Ransomware: The New Cybercriminal Group Targeting Artificial Intelligence Data

In the DarkLab group's underground analysis activity, we ventured onto an onion site that is apparently a Data Leak Site (DLS) of a new ransomware cyber gang. This new actor...
Share on Facebook Share on LinkedIn Share on X
UK digital Crackdown

The UK’s Digital Crackdown: how the government is using our online habits to breach human rights


In today's digital age, the boundaries between lawful expression and governmental overreach are becoming increasingly blurred in the United Kingdom. Citizens are finding themselves under scrutiny, and in some cases,...
Share on Facebook Share on LinkedIn Share on X

Ransomware Gangs weaponize Windows Defender Application Control (WDAC) to disable EDR products.

In the past days we saw that Ransomware Gangs use WDAC to disable EDR products. I have known this type of attack for a year when a guy posts a...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoinnovation
Red Hot Cyber and Hack The Box: together for the CTF at the RHC 2026 conference
Redazione RHC - 21/01/2026

In the Italian and European cybersecurity landscape, few collaborations manage to combine educational vision, technical realism, and community impact as effectively as the partnership announced between Red Hot Cyber and Hack The Box (HTB) for…

Immagine del sitoCybercrime
Everest Ransomware Attacks McDonald’s, 861GB Data Stolen
Redazione RHC - 21/01/2026

Yesterday, the Everest cybercriminal gang claimed responsibility for a cyberattack on McDonald’s on their Data Leak Site (DLS) . From the gang’s post, the cybercriminals claim to have 861GB of data exfiltrated from the company’s…

Immagine del sitoCybercrime
ESXi Zero-Day Exploit: How to Protect Your VMware Environment
Redazione RHC - 20/01/2026

A group of attackers is using a zero-day exploit toolkit to compromise VMware ESXi instances in an uncontrolled manner, taking advantage of multiple vulnerabilities to bypass virtual machine restrictions. The current incident highlights the ongoing…

Immagine del sitoCybercrime
Google Fast Pair Vulnerability: WhisperPair Exposes Millions of Devices
Redazione RHC - 19/01/2026

Researchers from the Cybersecurity and Industrial Cryptography team at KU Leuven have discovered a critical flaw in the Google Fast Pair protocol. The vulnerability allows attackers to hijack control of millions of Bluetooth devices, track…

Immagine del sitoCybercrime
Elon Musk Sues OpenAI for $134 Billion Over AI Betrayal
Redazione RHC - 19/01/2026

Elon Musk has filed a staggering $134 billion in damages in a malicious lawsuit against OpenAI and Microsoft. According to Bloomberg , the latest lawsuit accuses OpenAI of betraying its core mission as a nonprofit…