Red Hot Cyber. The Cybersecurity Blog
Featured Articles

Apple is going through a period of major leadership changes , with the departure of key figures who have contributed significantly to the company’s technological development. The latest executive to...

Cloudflare experienced a significant outage on the morning of December 5, 2025, when at 8:47 a.m. UTC, a portion of its infrastructure began experiencing internal errors. The incident, which lasted ap...

A critical vulnerability has been published in Apache Tika that could allow an XML external entity injection attack, known as XXE . The vulnerability, classified as CVE-2025-66516, has a CVE severity ...

A spokesperson for the Chinese Embassy in Canada responded to a reporter’s question about the outcry in Canada over so-called “Chinese cyber attacks.” A reporter asked : Recently, the Canadian C...

Starting July 1, 2026, Microsoft 365 and Office 365 subscription prices for business and government customers will increase by 8% to 33% , depending on the plan. This price adjustment will apply to bo...
NIST selects second PQC Key Encapsulation algorithm
Paragon Spyware – Let’s talk about privacy and governments
Beyond the Dark Storm’s attack on X: how hacktivism’s Illusion reinforces the System
Babuk Locker 2.0: The New Ransomware Affiliate Program
NightSpire: A New Player in the Ransomware Landscape
Crazyhunter: The Ransomware with the Three-Dimensional Data Annihilation System That Redefines Data Destruction

NIST selects second PQC Key Encapsulation algorithm
Tara Lie - March 17th, 2025
The fourth round of the American National Institute of Standards and Technology (NIST) Post Quantum Cryptography (PQC) competition has selected HQC as a secondary quantum-resilient key encapsulation mechanism (KEM) to...

Paragon Spyware – Let’s talk about privacy and governments
Alessio Stefan - March 17th, 2025
Politics, information technology, and privacy. A triad continually seeking balance with a history of conflict that originates from the introduction of personal computers at the consumer level. Attempts by the...

Beyond the Dark Storm’s attack on X: how hacktivism’s Illusion reinforces the System
Olivia Terragni - March 17th, 2025
The Dark Storm attack on X (formerly Twitter) has been significant for several reasons. The attack on March 10 2025 - a multi-layered Distributed Denial-of-Service (DDoS) using a botnet -...

Babuk Locker 2.0: The New Ransomware Affiliate Program
Pietro Melillo - March 12th, 2025
Babuk, one of the most notorious ransomware groups in cybercrime, has launched the Babuk Locker 2.0 Affiliate Program 2025, an affiliate program for skilled hackers looking to profit from ransomware...

NightSpire: A New Player in the Ransomware Landscape
Pietro Melillo - March 11th, 2025
During our reconnaissance into the underground world and criminal groups conducted by Red Hot Cyber's threat intelligence laboratory DarkLab, we stumbled upon a Data Leak Site of a cyber gang...

Crazyhunter: The Ransomware with the Three-Dimensional Data Annihilation System That Redefines Data Destruction
Pietro Melillo - March 9th, 2025
In the reconnaissance of the world of the underground and criminal groups carried out by Red Hot Cyber's DarkLab threat intelligence lab, we came across a Data Leak Site of...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

