Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Banner Ancharia Mobile 1
Banner Ancharia Desktop 1 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Beyond the Dark Storm’s attack on X: how hacktivism’s Illusion reinforces the System Cyberpolitics

Beyond the Dark Storm’s attack on X: how hacktivism’s Illusion reinforces the System

The Dark Storm attack on X (formerly Twitter) has been significant for several reasons. The attack on March 10 2025...
Olivia Terragni - 18 March 2025
Babuk Locker 2.0: The New Ransomware Affiliate Program Cybercrime

Babuk Locker 2.0: The New Ransomware Affiliate Program

Babuk, one of the most notorious ransomware groups in cybercrime, has launched the Babuk Locker 2.0 Affiliate Program 2025, an...
Pietro Melillo - 13 March 2025
NightSpire: A New Player in the Ransomware Landscape Cybercrime

NightSpire: A New Player in the Ransomware Landscape

During our reconnaissance into the underground world and criminal groups conducted by Red Hot Cyber's threat intelligence laboratory DarkLab, we...
Pietro Melillo - 12 March 2025
Crazyhunter: The Ransomware with the Three-Dimensional Data Annihilation System That Redefines Data Destruction Cybercrime

Crazyhunter: The Ransomware with the Three-Dimensional Data Annihilation System That Redefines Data Destruction

In the reconnaissance of the world of the underground and criminal groups carried out by Red Hot Cyber's DarkLab threat...
Pietro Melillo - 10 March 2025
Interviewing ChatGPT: the AI that feels human, to its Asperger’s users. innovation

Interviewing ChatGPT: the AI that feels human, to its Asperger’s users.

Have you ever experienced that ChatGPT recognizes who it is talking to? I share my ChatGPT account with my spouse,...
Ashleigh Crause - 7 March 2025
Akira Ransomware: The New Threat Using Webcams as Entry Points Cybercrime

Akira Ransomware: The New Threat Using Webcams as Entry Points

Akira represents one of the most recent ransomware threats capable of bypassing traditional organizational defense mechanisms. A recent case analyzed...
Pietro Melillo - 7 March 2025

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Microsoft Copilot Vulnerability Exposes User Data to Hackers
Redazione RHC - 15/01/2026

A recently fixed vulnerability allowed attackers to exploit Microsoft Copilot Personal with a single click to steal sensitive user data. Using a phishing link, attackers were able to take control of sessions without requiring further…

Immagine del sitoCybercrime
Progress Software Patches LoadMaster, MOVEit WAF Vulnerabilities
Redazione RHC - 15/01/2026

On January 12, 2026, Progress Software Corporation released patches that address two high-severity Command Injection vulnerabilities, which could allow remote attackers to execute malicious code on LoadMaster load balancers and MOVEit Web Application Firewalls (WAFs).…

Immagine del sitoCybercrime
24-Year-Old Hacker Breaches US Supreme Court Database
Redazione RHC - 14/01/2026

Do you remember the 24-year-old hacker Carmelo Miano and the breaches of the Naples Prosecutor’s Office’s accounts and computer systems? It appears something similar happened in the United States, and the other young man is…

Immagine del sitoCybercrime
Cloudflare vs Italy: The Battle for Internet Freedom and DNS Control
Redazione RHC - 14/01/2026

Cloudflare CEO Matthew Prince has threatened to shut down the company’s operations in Italy after the country’s telecom regulator fined it twice its annual revenue in the country. The facts The conflict erupted around Italy’s…

Immagine del sitoCybercrime
Cybercrime Meets Real-Life Violence: Foxtrot Network’s Dark Side
Redazione RHC - 13/01/2026

In recent months, there has been increasing talk of a paradigm shift in cybercrime . What for years was perceived as a predominantly digital ecosystem— consisting of fraud, identity theft, online extortion, and cyberattacks —is…