Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Crowdstrike 320×100
Crowdstriker 970×120

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Red Hot Cyber Conference 2026: Sponsorships Open for the Fifth Edition in Rome Cybercrime

Red Hot Cyber Conference 2026: Sponsorships Open for the Fifth Edition in Rome

The Red Hot Cyber Conference has become a regular event for the Red Hot Cyber community and for anyone working...
Redazione RHC - 4 September 2025
Hexstrike AI unleashes chaos! Zero-days exploited in record time Cybercrime

Hexstrike AI unleashes chaos! Zero-days exploited in record time

The release of Hexstrike-AI marks a turning point in the cybersecurity landscape. The framework, billed as a next-generation tool for...
Redazione RHC - 4 September 2025
Microsoft Introduces POML for Orchestrating LLM Prompts Cybercrime

Microsoft Introduces POML for Orchestrating LLM Prompts

Microsoft today introduced POML (Prompt Orchestration Markup Language), a new markup language for prompt orchestration and specifically designed to enable...
Redazione RHC - 4 September 2025
CISO vs. DPO: Collaboration or Cold War in Business? Cybercrime

CISO vs. DPO: Collaboration or Cold War in Business?

Managing security is far from simple, it's not something that can be standardized, and above all, it can't be achieved...
Stefano Gazzella - 4 September 2025
Revolutionize security models with the Unified SASE framework Cybercrime

Revolutionize security models with the Unified SASE framework

A unified and secure approach to support digital transformation, enable hybrid working, and reduce operational complexity. By Federico Saraò, Specialized...
Redazione RHC - 4 September 2025
New blackmail: if you don’t pay, we’ll feed all your data to artificial intelligence! Cybercrime

New blackmail: if you don’t pay, we’ll feed all your data to artificial intelligence!

The hacker group LunaLock has added a new element to the classic extortion scheme, preying on the fears of artists...
Redazione RHC - 3 September 2025

UNZIPPED DATA – LEVI STRAUSS COMPROMISED ACCOUNTS

The legendary Jeans retailer Levi Strauss & Co. identified a significant data breach that affected over 72,000 customers. The incident was discovered on June 13th, 2024 and it was the...
Share on Facebook Share on LinkedIn Share on X
lockbit

LockBit: The Bluff of Double Extortion Against the Federal Reserve

In recent years, the cybersecurity landscape has been dominated by the growing threat posed by ransomware groups. Among these, LockBit has emerged as one of the most notorious and feared....
Share on Facebook Share on LinkedIn Share on X

Xehook Stealer: The Rise and Sale of a Formidable Stealer Malware

Introduction Xehook Stealer is a sophisticated malware targeting Windows operating systems, first discovered in January 2024. Within a year, Xehook has rapidly gained notoriety for its advanced data collection capabilities...
Share on Facebook Share on LinkedIn Share on X

DataLeak Microsoft: 4GB of Microsoft PlayReady Code Made Public!

On June 11, a Microsoft engineer inadvertently made 4GB of internal code related to Microsoft PlayReady public. The information leak occurred on the Microsoft Developer Community, a forum dedicated to...
Share on Facebook Share on LinkedIn Share on X

Linux Kernel UAF 0-day Vulnerability on sale in the Dark Web 

Recently, a security alert shaked the infosec environment: A malicious actor has announced the sale of Use After Free (UAF) 0-day vulnerability affecting the Linux Kernel on the well-known darknet...
Share on Facebook Share on LinkedIn Share on X

WordPress: Five Plugins Found with Malicious Code

On June 24, 2024, Wordfence revealed a supply chain attack on WordPress plugins, leading to the compromise of five plugins with malicious code. The affected plugins are: Social Warfare (versions...
Share on Facebook Share on LinkedIn Share on X

Julian Assange Free! Freedom Reclaimed After Five Years of Detention

London, June 25, 2024 - Julian Assange, the founder of WikiLeaks, was released yesterday from the maximum-security Belmarsh prison after spending 1901 days in detention. The news was announced by...
Share on Facebook Share on LinkedIn Share on X

BlackByte: The Return of the Gang after a few months of inactivity

In recent years, the cybersecurity landscape has been marked by ongoing ransomware attacks , with criminal groups constantly evolving to evade defenses. One such group, known as BlackByte, recently returned to action...
Share on Facebook Share on LinkedIn Share on X

Presumed Cyber Attack on Zerto: Not for Financial or Espionage Purposes but for Political Reasons

Recently, Handala, a malicious actor, posted on a well-known dark web forum, claiming a cyber attack against Zerto, a subsidiary of Hewlett Packard Enterprise (HPE). Zerto is renowned for its...
Share on Facebook Share on LinkedIn Share on X

Lockbit 3.0 Claims Attack on Federal Reserve: 33 Terabytes of Sensitive Data Allegedly Compromised

In a significant escalation within the cybersecurity realm, the notorious ransomware group Lockbit 3.0 has claimed responsibility for a cyberattack targeting the Federal Reserve of the United States. The declaration...
Share on Facebook Share on LinkedIn Share on X

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Cyber Criminals Recruit Insiders: Companies at Risk of Internal Threats
Redazione RHC - 27/12/2025

The cybercriminal community is rapidly increasing its interest in recruiting personnel from within companies . Instead of sophisticated external attacks, criminals are increasingly relying on internal sources— people willing to provide access to company systems…

Immagine del sitoCybercrime
Villager Framework: AI-Powered Penetration Testing Tool
Redazione RHC - 26/12/2025

Straiker’s AI Research (STAR) team has identified Villager, a native AI-based penetration testing framework developed by the Chinese group Cyberspike . The tool, presented as a red team solution , is designed to fully automate…

Immagine del sitoCybercrime
A $500 Tool Claims to Kill EDRs at Kernel Level: Inside the NtKiller Underground Ad
Redazione RHC - 25/12/2025

An ad has surfaced on a closed underground forum frequented by malware operators and initial access brokers, attracting the attention of the cyber threat intelligence community. The post promotes “NtKiller,” a supposed “kernel-level” utility designed…

Immagine del sitoCybercrime
Webrat Malware Targets Security Researchers with GitHub Exploit Traps
Redazione RHC - 24/12/2025

There’s a specific moment, almost always at night, when curiosity overtakes caution. A newly opened repository, few stars but a success. very high score, the README file is well written enough to seem real. This…

Immagine del sitoCybercrime
A backdoor in NVIDIA code. Three 9.8 bugs plague AI and robotics development systems
Redazione RHC - 24/12/2025

When it comes to cybersecurity, you can never be too careful. Furthermore, when we talk about backdoors (or alleged ones), the question that follows is: who inserted them? Was it for maintenance purposes or for…