Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
TM RedHotCyber 320x100 042514
Banner Ransomfeed 970x120 1

Red Hot Cyber. The Cybersecurity Blog

Previous Next

Ultime news

Interview with Luca Cadonici: computer and mobile forensics towards a proactive approach against cybercrime Cybercrime

Interview with Luca Cadonici: computer and mobile forensics towards a proactive approach against cybercrime

Nowadays, the Digital Forensics is not just a weapon to fight crime but a scientific discipline that "is no longer...
Olivia Terragni - 11 November 2024
Potential Compromise of a U.S. Military Database Cybercrime

Potential Compromise of a U.S. Military Database

A high-ranking user of BreachForums, known as "GOD," is reportedly selling an alleged database belonging to the U.S. Military, which...
Pietro Melillo - 6 November 2024
Hellcat Claims an Alleged Breach Against Schneider Electric Cybercrime

Hellcat Claims an Alleged Breach Against Schneider Electric

In recent hours, the ransomware group known as Hellcat has claimed responsibility for an alleged attack against Schneider Electric, a...
Pietro Melillo - 4 November 2024
Herm1t Interview – From VX Heaven to the war gates! Hacking

Herm1t Interview – From VX Heaven to the war gates!

This is the story of Herm1t, founder of VX-Heaven, hacker - currently active in protecting Ukraine from 2014 -  and...
Alessio Stefan - 4 November 2024
Israeli Air Force Data Sale: A Suspected Leak Puts Sensitive Information at Risk Cybercrime

Israeli Air Force Data Sale: A Suspected Leak Puts Sensitive Information at Risk

Recently, a cyber threat actor known as EagleStrike posted an announcement on a dark web forum, claiming to possess confidential...
Pietro Melillo - 2 November 2024
IBM Hacked? Threat Actor ‘888’ Reveals Thousands of Employees’ Data Leak! Cybercrime

IBM Hacked? Threat Actor ‘888’ Reveals Thousands of Employees’ Data Leak!

Recently, the notorious Threat Actor, identified by the nickname 888 , claimed to have breached IBM systems and stolen personal data belonging to the company's employees....
Luca Galuppi - 31 October 2024

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE

Featured Articles

Immagine del sitoCybercrime
Microsoft Copilot Vulnerability Exposes User Data to Hackers
Redazione RHC - 15/01/2026

A recently fixed vulnerability allowed attackers to exploit Microsoft Copilot Personal with a single click to steal sensitive user data. Using a phishing link, attackers were able to take control of sessions without requiring further…

Immagine del sitoCybercrime
Progress Software Patches LoadMaster, MOVEit WAF Vulnerabilities
Redazione RHC - 15/01/2026

On January 12, 2026, Progress Software Corporation released patches that address two high-severity Command Injection vulnerabilities, which could allow remote attackers to execute malicious code on LoadMaster load balancers and MOVEit Web Application Firewalls (WAFs).…

Immagine del sitoCybercrime
24-Year-Old Hacker Breaches US Supreme Court Database
Redazione RHC - 14/01/2026

Do you remember the 24-year-old hacker Carmelo Miano and the breaches of the Naples Prosecutor’s Office’s accounts and computer systems? It appears something similar happened in the United States, and the other young man is…

Immagine del sitoCybercrime
Cloudflare vs Italy: The Battle for Internet Freedom and DNS Control
Redazione RHC - 14/01/2026

Cloudflare CEO Matthew Prince has threatened to shut down the company’s operations in Italy after the country’s telecom regulator fined it twice its annual revenue in the country. The facts The conflict erupted around Italy’s…

Immagine del sitoCybercrime
Cybercrime Meets Real-Life Violence: Foxtrot Network’s Dark Side
Redazione RHC - 13/01/2026

In recent months, there has been increasing talk of a paradigm shift in cybercrime . What for years was perceived as a predominantly digital ecosystem— consisting of fraud, identity theft, online extortion, and cyberattacks —is…