Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
UtiliaCS 320x100
TM RedHotCyber 970x120 042543

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Ransomware Gangs weaponize Windows Defender Application Control (WDAC) to disable EDR products. Cybercrime

Ransomware Gangs weaponize Windows Defender Application Control (WDAC) to disable EDR products.

In the past days we saw that Ransomware Gangs use WDAC to disable EDR products. I have known this type...
Alex Necula - 13 January 2025
The Story Of Conti Ransomware – The Last Ceremony (Final Episode) Cybercrime

The Story Of Conti Ransomware – The Last Ceremony (Final Episode)

This is the last episode of “The Story Of Conti Ransomware” series, we would finally reach the decline of the...
Alessio Stefan - 8 January 2025
The Fall of the Human Conscience: Programming Desensitization Culture

The Fall of the Human Conscience: Programming Desensitization

Author: Ashleigh Crause Is our Obsessive use of technology making us insensitive? “Technology - Ashleigh Crause tells us - is,...
Olivia Terragni - 4 January 2025
Harley-Davidson Targeted by Cyber ​​Criminals: 888 Claims Data Breach Cybercrime

Harley-Davidson Targeted by Cyber ​​Criminals: 888 Claims Data Breach

Recently, a threat actor on an underground forum posted an alleged data breach. According to reports, the famous American company...
RHC Dark Lab - 31 December 2024
FBI responds to threats and announcement of LockBit 4.0 Cybercrime

FBI responds to threats and announcement of LockBit 4.0

In the last month of 2024, LockBit has been exodusively talked about. The prominent news is the long-awaited release of...
Alessio Stefan - 22 December 2024
Brain Chiper claims computer attack on Deloitte. 1 Tera Byte of data Cybercrime

Brain Chiper claims computer attack on Deloitte. 1 Tera Byte of data

At 14:35 today, the claim of a cyber attack on the consulting giant Deloitte was detected on BrainChiper's Data Leak...
Luca Stivali - 4 December 2024

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Microsoft Copilot Vulnerability Exposes User Data to Hackers
Redazione RHC - 15/01/2026

A recently fixed vulnerability allowed attackers to exploit Microsoft Copilot Personal with a single click to steal sensitive user data. Using a phishing link, attackers were able to take control of sessions without requiring further…

Immagine del sitoCybercrime
Progress Software Patches LoadMaster, MOVEit WAF Vulnerabilities
Redazione RHC - 15/01/2026

On January 12, 2026, Progress Software Corporation released patches that address two high-severity Command Injection vulnerabilities, which could allow remote attackers to execute malicious code on LoadMaster load balancers and MOVEit Web Application Firewalls (WAFs).…

Immagine del sitoCybercrime
24-Year-Old Hacker Breaches US Supreme Court Database
Redazione RHC - 14/01/2026

Do you remember the 24-year-old hacker Carmelo Miano and the breaches of the Naples Prosecutor’s Office’s accounts and computer systems? It appears something similar happened in the United States, and the other young man is…

Immagine del sitoCybercrime
Cloudflare vs Italy: The Battle for Internet Freedom and DNS Control
Redazione RHC - 14/01/2026

Cloudflare CEO Matthew Prince has threatened to shut down the company’s operations in Italy after the country’s telecom regulator fined it twice its annual revenue in the country. The facts The conflict erupted around Italy’s…

Immagine del sitoCybercrime
Cybercrime Meets Real-Life Violence: Foxtrot Network’s Dark Side
Redazione RHC - 13/01/2026

In recent months, there has been increasing talk of a paradigm shift in cybercrime . What for years was perceived as a predominantly digital ecosystem— consisting of fraud, identity theft, online extortion, and cyberattacks —is…