Red Hot Cyber. The Cybersecurity Blog

Ferrari avoids deepfake scam! An executive unmasks the CEO’s fake audio messages
In an incident earlier this month, a Ferrari executive found himself receiving unusual messages that appeared to come from the company’s CEO, Benedetto Vigna. The messages came via WhatsApp, owned by Meta Inc. and suggested that a major acquisition was

The Ransomware Group Ransomexx Claims Attack on Liteon
On July 26, 2024, the ransomware group Ransomexx publicly claimed responsibility for an attack against Liteon, a giant in the electronic components sector. This attack is further evidence of the growing threat that cybercriminals pose to large companies. Below, we

A Threat Actors Posts Update on Luxottica’s 2021 Data Breach
Recently, a threat actor in a clandestine forum posted an update on the 2021 data breach concerning the giant Luxottica, one of the world’s largest eyewear companies. According to the post, the breach allegedly exposed extensive personal information of millions

The dark side of the Windows Command Prompt: how malicious commands can replace legitimate ones
If you choose to read this article, please note that it will not discuss a vulnerability or a bug, but rather an intended behavior of Windows Command Prompt which, in my opinion, poses a security risk.I decided to publish it

RHC interviews RADAR and DISPOSSESSOR: “When it comes to security, the best defense is a good offense.”
In our usual underground analysis activities, we came into contact with the cyber gang DISPOSSESSOR, which came to attention in February 2024 in the cyber threat landscape. Accessing their Data Leak Site (DLS) one immediately realizes a strong resemblance to

IntelBroker Strikes Again: Unauthorized Access to Two Major American Companies Up for Sale
IntelBroker strikes again, announcing the sale of unauthorized access to two major American companies, each with revenues reaching hundreds of billions. This announcement was made public through a post on the dark web forum, BreachForums, known for selling illicit data

VanHelsing RaaS: An Expanding Ransomware-as-a-Service Model
Pietro Melillo - March 22nd, 2025
The ransomware threat landscape is constantly evolving, with increasingly structured groups adopting sophisticated strategies to maximize profits. VanHelsing is a new player positioning itself in the Ransomware-as-a-Service (RaaS) market, a...

NIST selects second PQC Key Encapsulation algorithm
Tara Lie - March 18th, 2025
The fourth round of the American National Institute of Standards and Technology (NIST) Post Quantum Cryptography (PQC) competition has selected HQC as a secondary quantum-resilient key encapsulation mechanism (KEM) to...

Paragon Spyware – Let’s talk about privacy and governments
Alessio Stefan - March 18th, 2025
Politics, information technology, and privacy. A triad continually seeking balance with a history of conflict that originates from the introduction of personal computers at the consumer level. Attempts by the...

Beyond the Dark Storm’s attack on X: how hacktivism’s Illusion reinforces the System
Olivia Terragni - March 18th, 2025
The Dark Storm attack on X (formerly Twitter) has been significant for several reasons. The attack on March 10 2025 - a multi-layered Distributed Denial-of-Service (DDoS) using a botnet -...
Sign up for the newsletter