Red Hot Cyber. The Cybersecurity Blog

Ransomware Gangs weaponize Windows Defender Application Control (WDAC) to disable EDR products.
In the past days we saw that Ransomware Gangs use WDAC to disable EDR products. I have known this type of attack for a year when a guy posts a similar technique on Twitter, but this is the first time

The Story Of Conti Ransomware – The Last Ceremony (Final Episode)
This is the last episode of “The Story Of Conti Ransomware” series, we would finally reach the decline of the group and what this means for the current ransomware landscape. In the previous article group we have approached operations made

The Fall of the Human Conscience: Programming Desensitization
Author: Ashleigh Crause Is our Obsessive use of technology making us insensitive? “Technology – Ashleigh Crause tells us – is, by far, one of the most amazing inventions to date”. Although all this comes at a price, naturally. I would

Harley-Davidson Targeted by Cyber Criminals: 888 Claims Data Breach
Recently, a threat actor on an underground forum posted an alleged data breach. According to reports, the famous American company Harley-Davidson has been the victim of a data breach that has exposed thousands of sensitive information relating to its customers.

FBI responds to threats and announcement of LockBit 4.0
In the last month of 2024, LockBit has been exodusively talked about. The prominent news is the long-awaited release of the 4.0 program of the most famous RaaS in the scene. After the entire Operation Cronos series, which does not

Brain Chiper claims computer attack on Deloitte. 1 Tera Byte of data
At 14:35 today, the claim of a cyber attack on the consulting giant Deloitte was detected on BrainChiper’s Data Leak Site. A countdown is active, marking the time for the publication of the data, which according to the cybercriminals will

Cloudflare Mitigates 7.3 Terabits Per Second Attack. Imagine 9350 HD Movies Downloaded in 45 Seconds
Redazione RHC - June 23rd, 2025
In mid-May 2025, Cloudflare blocked the largest DDoS attack ever recorded: 7.3 terabits per second (Tbps). This event comes shortly after the release of the DDoS Threat Report for Q1...

Myth: If I use a VPN, I am completely safe even on open and unsecured WiFi networks
Redazione RHC - June 23rd, 2025
Many believe that using a VPN guarantees total protection while browsing, even on completely open and unsafe WiFi networks. Although VPNs are effective tools for encrypting traffic and preventing data...

Your VPN is a Trojan! Here are 17 Free Apps Made in China That Spy on You While Google and Apple Get Fat
Redazione RHC - June 23rd, 2025
"If you don't pay for the service, you are the product. This is true for social networks, but also for free VPNs: your data, your privacy, is often the real...

Murders Like a Drink! Dark Web Recruits Kids With Encrypted Apps in Europe
Redazione RHC - June 23rd, 2025
A worrying criminal trend is taking hold in Europe: criminal gangs are using encrypted apps to recruit teenagers as young as 14 to commit violent crimes, including contract killings. These...
Sign up for the newsletter