Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Latest news

Hacker gang OPERA1ER stole $11 million from African companies Cyber News

Hacker gang OPERA1ER stole $11 million from African companies

Amsterdam, 07.11.2022 — Group-IB has today issued a new report, “OPERA1ER. Playing God without permission,” in collaboration withthe researchers from Orange CERT Coordination Center. The...
Redazione RHC - November 7, 2022
The Inventor of the P101 explains to us why Italy is destined to be a perennial “follower” innovation

The Inventor of the P101 explains to us why Italy is destined to be a perennial “follower”

Author: Massimiliano BrolliOriginal Publication Date: 12/12/2020Translator: Tara Lie Pier Giorgio Perotto (for those who do not know of him) was an...
Massimiliano Brolli - September 6, 2022
RHC interviews LockBit 3.0. “The main thing is not to start a nuclear war” Cybercrime

RHC interviews LockBit 3.0. “The main thing is not to start a nuclear war”

Translator: Tara Lie We often talk about the LockBit Ransomware-as-a-Service (RaaS) operation, recently remodelled as LockBit 3.0, which continues to bring...
Pietro Melillo - July 26, 2022
Spacewar! The Story of the First Video Game Created by Hackers at MIT Hacking

Spacewar! The Story of the First Video Game Created by Hackers at MIT

Author: Massimiliano BrolliOriginal Publication Date: 19/03/2021Translator: Tara Lie In this exciting story, we will catapult ourselves back to 1958 to MIT’s Tech...
Massimiliano Brolli - July 7, 2022
LockBit 3.0: making the ransomware Great Again Cybercrime

LockBit 3.0: making the ransomware Great Again

LockBit is a major player in the ransomware scene and has contributed heavily for this cyber-crime model to become one...
Pietro Melillo - July 6, 2022
The Founding Fathers of the Hacker Community Culture

The Founding Fathers of the Hacker Community

Author: Massimiliano BrolliOriginal Publication Date: 19/03/2021Translator: Tara Lie Hacker culture was brought to life thanks to computer scientist Richard Greenblatt and mathematician...
Massimiliano Brolli - June 28, 2022
The “Mother of all Demos”. Douglas Englebart’s Vision of the Future innovation

The “Mother of all Demos”. Douglas Englebart’s Vision of the Future

Author: Massimiliano BrolliOriginal Publication Date: 12/05/2022Translator: Tara Lie The “Mother of all Demos'' is the name retrospectively used by journalist Steven Levy,...
Redazione RHC - May 12, 2022
RHC ransomware Data Room – January 2022 Cybercrime

RHC ransomware Data Room – January 2022

Author: Dott. Luca Mella, Cyber Security Expert (founder doubleextortion.com) Translate: Vincenzo Marcovecchio Pubblication Date: 5/02/2022 In recent years, the ransomware...
Luca Mella - February 4, 2022
Why privacy does not exist Cyber News

Why privacy does not exist

Privacy, privacy, privacy, ... privacy comes first. How many times have we heard this sentence? Yes, because we talk a...
Redazione RHC - December 18, 2021
Electronic warfare between the USA, China, South and North Korea (part two) Cyberpolitics

Electronic warfare between the USA, China, South and North Korea (part two)

Author: Olivia TerragniPubblication Date: 13/12/2021 Given that North Korean cyberattacks are not a future threat, but already a FACT, we...
Olivia Terragni - December 17, 2021
North Korea’s cyberwarfare and its cyber army (part one) Cyberpolitics

North Korea’s cyberwarfare and its cyber army (part one)

Author: Olivia Terragni During the night, only one bright spot lights up in North Korea: the city of Pyongyang. Perhaps,...
Olivia Terragni - December 17, 2021
Making the cyber world a safer and better place: an interview with W1ntermute Hacking

Making the cyber world a safer and better place: an interview with W1ntermute

Author: Olivia terragni Pubblication Date: 11/11/2021 W1ntermute aka Sofya Ivanov is a woman who works in the cybersecurity industry as...
Olivia Terragni - November 12, 2021

A Brief History of Artificial Intelligence: From Alan Turing to Generative AI

Artificial Intelligence (AI) is in the Spotlight Today, Generating Unprecedented Interest and Debate. However, it's important to recognize that this revolutionary technology has a rich history spanning over seventy years...

The Virginia Department of Elections database may have been hacked and is online on the dark web

A serious security incident appears to have hit the Virginia Department of Elections, causing the unauthorised dissemination of a large election database. The attack, claimed by a user known as...

Identified a POC for the CVE-2024-34102 Vulnerability in Magento / Adobe Commerce

Recently, a Proof of Concept (POC) for a vulnerability identified as CVE-2024-34102, which affects the Magento and Adobe Commerce e-commerce platforms, has been found online. This vulnerability, detected by security...

Cyberpunk 2077: Source Code Stolen?

A malicious actor has claimed to have obtained access to the complete source code of Cyberpunk 2077, the famous role-playing game developed by CD Projekt Red. If confirmed, this claim...

Alleged Leak of the 2020 Israeli Voter Database

In a significant and concerning development, an individual using the alias "mrwan" has allegedly leaked the 2020 Israeli voter database. The personal data of all 6.5 million Israeli voters has...

TeamViewer: Irregularity Detected in Internal IT Environment

TeamViewer, a leading company in the remote access and support software sector, has announced that it has detected an irregularity in its internal IT environment. This event has alarmed both...

RansomHub criminal hackers claim cyber attack on Coca Cola

Today, the RansomHub gang of cybercriminals claimed on their Data Leak Site (DLS) an IT attack on Coca Cola. We still do not know whether this cyber attack actually affected...

Threat Actor “DragonForce” Seeks New Partners 

A recent post on a dark web forum reveals that a cybercriminal group known as "DragonForce" is actively seeking new partners to join their Ransomware-as-a-Service (RaaS) operation. This recruitment drive...

Cyber ​​catastrophe in sight? The new Bug on MOVEit has an Online PoC Exploit

In the realm of cybersecurity, vulnerabilities constantly represent a significant risk for businesses and institutions. Many system administrators may recall CVE-2023-34362 from last year, a catastrophic vulnerability in Progress MOVEit...

UNZIPPED DATA – LEVI STRAUSS COMPROMISED ACCOUNTS

The legendary Jeans retailer Levi Strauss & Co. identified a significant data breach that affected over 72,000 customers. The incident was discovered on June 13th, 2024 and it was the...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE