Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Banner Ransomfeed 320x100 1
HackTheBox 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

The Exploit for the RCE on Palo Alto Firewalls is now Online! And let the Administration be for all Cybercrime

The Exploit for the RCE on Palo Alto Firewalls is now Online! And let the Administration be for all

A few hours ago on Breach Forum, a threat actor by the name “newplzqibeme” shared a GitHub repository where a...
Luca Stivali - 3 December 2024
RHC DarkLab Interviews Interlock Ransomware. “Don’t waste your energy and time. We will do it for you.” Cybercrime

RHC DarkLab Interviews Interlock Ransomware. “Don’t waste your energy and time. We will do it for you.”

RHC DarkLab has always taken a unique and provocative approach in the fight against cyber threats, summed up by the...
RHC Dark Lab - 2 December 2024
RHC DarkLab Interview Stormous Ransomware. Between history, ideology, techniques and tactics Cybercrime

RHC DarkLab Interview Stormous Ransomware. Between history, ideology, techniques and tactics

The Stormous group represents a significant threat in the ransomware landscape: it has an established reputation for its targeted attacks...
Redazione RHC - 24 November 2024
How Threat Actor make EDR’s harmless with a reboot Cybercrime

How Threat Actor make EDR’s harmless with a reboot

I became aware of this technique like 9 months ago, and now I see this on a attack in the...
Alex Necula - 22 November 2024
The Story Of Conti Ransomware – The War Within (Episode 2) Cybercrime

The Story Of Conti Ransomware – The War Within (Episode 2)

This is a continuation of the Conti story. You can read the previous part, which covered the group's origins, in...
Alessio Stefan - 22 November 2024
IntelBroker Claims Tesla Charging Database Breach Cybercrime

IntelBroker Claims Tesla Charging Database Breach

Recently, the threat actor known as IntelBroker , posted an alleged data breach. The post, which appeared on the BreachForums platform, claims...
Redazione RHC - 20 November 2024

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Microsoft Copilot Vulnerability Exposes User Data to Hackers
Redazione RHC - 15/01/2026

A recently fixed vulnerability allowed attackers to exploit Microsoft Copilot Personal with a single click to steal sensitive user data. Using a phishing link, attackers were able to take control of sessions without requiring further…

Immagine del sitoCybercrime
Progress Software Patches LoadMaster, MOVEit WAF Vulnerabilities
Redazione RHC - 15/01/2026

On January 12, 2026, Progress Software Corporation released patches that address two high-severity Command Injection vulnerabilities, which could allow remote attackers to execute malicious code on LoadMaster load balancers and MOVEit Web Application Firewalls (WAFs).…

Immagine del sitoCybercrime
24-Year-Old Hacker Breaches US Supreme Court Database
Redazione RHC - 14/01/2026

Do you remember the 24-year-old hacker Carmelo Miano and the breaches of the Naples Prosecutor’s Office’s accounts and computer systems? It appears something similar happened in the United States, and the other young man is…

Immagine del sitoCybercrime
Cloudflare vs Italy: The Battle for Internet Freedom and DNS Control
Redazione RHC - 14/01/2026

Cloudflare CEO Matthew Prince has threatened to shut down the company’s operations in Italy after the country’s telecom regulator fined it twice its annual revenue in the country. The facts The conflict erupted around Italy’s…

Immagine del sitoCybercrime
Cybercrime Meets Real-Life Violence: Foxtrot Network’s Dark Side
Redazione RHC - 13/01/2026

In recent months, there has been increasing talk of a paradigm shift in cybercrime . What for years was perceived as a predominantly digital ecosystem— consisting of fraud, identity theft, online extortion, and cyberattacks —is…