Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

Red Hot Cyber. The Cybersecurity Blog

- June 27th, 2025 - (Posted in Cybercrime and Darknet)
An unusual example of malicious code has been discovered in a real computing environment, which for the first time recorded an attempt to attack not classical defense mechanisms, but directly artificial intelligence systems. We are talking about the prompt injection technique, i.e. the introduction of hidden instructions capable of compromising...
Cybercrime and Darknet

The Threat Actor 888 claims responsibility for a breach at Nokia.

A malicious actor, known by the alias “888,” recently claimed responsibility for disclosing sensitive data belonging to Nokia. The attack, which occurred in July 2024, compromised a wide range of information, raising significant concerns about data security and the protection

Bug, 0-day and vulnerability

Citrix Netscaler ADC and Gateway plagued by serious DOS and Open Redirect flaw

Two vulnerabilities have been identified in NetScaler ADC and NetScaler Gateway. Affected Versions: The following supported versions of NetScaler ADC and NetScaler Gateway are vulnerable: These devices are widely used to enhance application performance and ensure controlled and secure access

Cybercrime and Darknet

Massive Data Exposure on X (Twitter) Affects 200 Million Users

Recently, X (Twitter) experienced a massive data exposure, compromising nearly 200 million user records. This incident could be one of the largest user data exposures in recent history, jeopardizing the security and privacy of millions of users. In this article,

T-Space Architects Potentially Targeted by Cicada3301 in Data Broker Ransomware Attack  

- October 20th, 2024

 London-based architectural firm T-Space Architects may find itself at the center of a significant cyberattack. The ransomware group Cicada3301 has reportedly added T-Space to its growing list of victims, threatening...

  

Stormous claims an attack on NASA

- October 9th, 2024

In recent years, the landscape of cyber threats has been dominated by increasingly sophisticated ransomware groups. Among them, the ransomware group Stormous has gained notoriety for targeting high-profile organizations, including...

  

The Story Of Conti Ransomware – Origins and Evolution of the RaaS Model (Episode 1)

- September 30th, 2024

Ransomware, a malware designed to encrypt data making them restorable only with the use of a private key. Relatively simple math is all that threat actors out there needs to...

  

RHC Interviews Lynx Ransomware. The cyber-gang offering Pentest services ensuring privacy

- September 23rd, 2024

In July 2024, the Lynx group burst into the RaaS world, which from the outset demonstrated above-average aggressiveness and success in attacks with a total of 22 victims featured on...

  

Sign up for the newsletter