Red Hot Cyber. The Cybersecurity Blog

Herm1t Interview – From VX Heaven to the war gates!
This is the story of Herm1t, founder of VX-Heaven, hacker – currently active in protecting Ukraine from 2014 – and founder of RUH8 in fall 2015, told by means of an interview that sought to focus on its history, values

Israeli Air Force Data Sale: A Suspected Leak Puts Sensitive Information at Risk
Recently, a cyber threat actor known as EagleStrike posted an announcement on a dark web forum, claiming to possess confidential data concerning the Israeli Air Force (IAF). According to the post, this collection of information includes critical details about both

IBM Hacked? Threat Actor ‘888’ Reveals Thousands of Employees’ Data Leak!
Recently, the notorious Threat Actor, identified by the nickname 888 , claimed to have breached IBM systems and stolen personal data belonging to the company’s employees. The leak, dated October 2024, allegedly resulted in the compromise of approximately 17,500 rows of data. At this time, we cannot

Fortinet Issues Bulletin for Critical 9.8 Bug on FortiManager under Active Exploitation
Recently, Fortinet disclosed a critical vulnerability, identified as CVE-2024-47575, affecting FortiManager. This is a missing authentication vulnerability for critical functions [CWE-306] in the FortiManager fgfmd daemon, which could allow an unauthenticated remote attacker to execute arbitrary code or commands via

US Elections and psy-ops: main threats come from Digital Echo Chambers and erosion of trust in democratic processes
On November 5th, 2024, the next President and Vice President of the United States of America will be elected, as well as 1/3 of the U.S. Senators and all 435 Members of the U.S. House of Representatives will be chosen.

T-Space Architects Potentially Targeted by Cicada3301 in Data Broker Ransomware Attack
London-based architectural firm T-Space Architects may find itself at the center of a significant cyberattack. The ransomware group Cicada3301 has reportedly added T-Space to its growing list of victims, threatening to expose 50 GB of sensitive company data. If the

ChatGPT is Shutting Down Our Brains! Alarming MIT Research Shows Mental Decay
Redazione RHC - June 22nd, 2025
During a RHC Conference, Corrado Giustozzi underlined a truth as simple as it is powerful: “Human beings have always been creators of amplifiers.”. From the wheel to the car, every...

AKIRA emergency report: the ransomware that is breaching Italy
RHC Dark Lab - June 22nd, 2025
Spring 2025 will be remembered as a turning point in our country's cyber chronicle. As bulletins and technical releases follow one another, one fact emerges glaringly: AKIRA has entered the...

RHC GhostSec interview: hacktivism in the shadows of terrorism and cyber conflict
RHC Dark Lab - June 12th, 2025
Ghost Security, also known as GhostSec, is a hacktivist group which emerged in the context of the cyber war against Islamic extremism. The first actions of the group date back...

Group-IB contributes to INTERPOL’s Operation Secure, leading to the arrest of 32 suspects linked to information stealer malware in Asia
Redazione RHC - June 11th, 2025
[Singapore; 11 June, 2025] Group-IB, a leading creator of cybersecurity technologies to investigate, prevent, and fight digital crime, announced today that it has contributed to INTERPOL’s “Operation Secure”, which took...
Sign up for the newsletter