Red Hot Cyber. The Cybersecurity Blog
Featured Articles

Apple is going through a period of major leadership changes , with the departure of key figures who have contributed significantly to the company’s technological development. The latest executive to...

Cloudflare experienced a significant outage on the morning of December 5, 2025, when at 8:47 a.m. UTC, a portion of its infrastructure began experiencing internal errors. The incident, which lasted ap...

A critical vulnerability has been published in Apache Tika that could allow an XML external entity injection attack, known as XXE . The vulnerability, classified as CVE-2025-66516, has a CVE severity ...

A spokesperson for the Chinese Embassy in Canada responded to a reporter’s question about the outcry in Canada over so-called “Chinese cyber attacks.” A reporter asked : Recently, the Canadian C...

Starting July 1, 2026, Microsoft 365 and Office 365 subscription prices for business and government customers will increase by 8% to 33% , depending on the plan. This price adjustment will apply to bo...
Crazyhunter: The Ransomware with the Three-Dimensional Data Annihilation System That Redefines Data Destruction
Interviewing ChatGPT: the AI that feels human, to its Asperger’s users.
Akira Ransomware: The New Threat Using Webcams as Entry Points
Possible breach at Ukraine’s Ministry of Foreign Affairs: the Qilin Ransomware group claims responsibility for the attack
A New Dark Actor Enters the Criminal Underground. Discovering Skira Ransomware
Analysis of Recorded Future’s CVE Report – February 2025

Crazyhunter: The Ransomware with the Three-Dimensional Data Annihilation System That Redefines Data Destruction
Pietro Melillo - March 9th, 2025
In the reconnaissance of the world of the underground and criminal groups carried out by Red Hot Cyber's DarkLab threat intelligence lab, we came across a Data Leak Site of...

Interviewing ChatGPT: the AI that feels human, to its Asperger’s users.
Ashleigh Crause - March 6th, 2025
Have you ever experienced that ChatGPT recognizes who it is talking to? I share my ChatGPT account with my spouse, and when he uses it, he gets the generic, prepackaged...

Akira Ransomware: The New Threat Using Webcams as Entry Points
Pietro Melillo - March 6th, 2025
Akira represents one of the most recent ransomware threats capable of bypassing traditional organizational defense mechanisms. A recent case analyzed by the S-RM team highlighted how this group leveraged an...

Possible breach at Ukraine’s Ministry of Foreign Affairs: the Qilin Ransomware group claims responsibility for the attack
Pietro Melillo - March 6th, 2025
The Qilin Ransomware group claims to have compromised the systems of Ukraine’s Ministry of Foreign Affairs, stealing private correspondence, personal information, and official decrees. According to the attackers, some of...

A New Dark Actor Enters the Criminal Underground. Discovering Skira Ransomware
Pietro Melillo - March 6th, 2025
During our reconnaissance into the underground world and criminal groups conducted by Red Hot Cyber's threat intelligence laboratory DarkLab, we stumbled upon a Data Leak Site of a cyber gang...

Analysis of Recorded Future’s CVE Report – February 2025
Sandro Sana - March 4th, 2025
The monthly Recorded Future CVE report for February 2025 provides a detailed overview of current cybersecurity threats, highlighting a slight decline compared to the previous month. A total of 25...
Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

