
Beyond the Dark Storm’s attack on X: how hacktivism’s Illusion reinforces the System
The Dark Storm attack on X (formerly Twitter) has been significant for several reasons. The attack on March 10 2025 – a multi-layered Distributed Denial-of-Service

Babuk Locker 2.0: The New Ransomware Affiliate Program
Babuk, one of the most notorious ransomware groups in cybercrime, has launched the Babuk Locker 2.0 Affiliate Program 2025, an affiliate program for skilled hackers

NightSpire: A New Player in the Ransomware Landscape
During our reconnaissance into the underground world and criminal groups conducted by Red Hot Cyber’s threat intelligence laboratory DarkLab, we stumbled upon a Data Leak

Crazyhunter: The Ransomware with the Three-Dimensional Data Annihilation System That Redefines Data Destruction
In the reconnaissance of the world of the underground and criminal groups carried out by Red Hot Cyber’s DarkLab threat intelligence lab, we came across

Interviewing ChatGPT: the AI that feels human, to its Asperger’s users.
Have you ever experienced that ChatGPT recognizes who it is talking to? I share my ChatGPT account with my spouse, and when he uses it,

Akira Ransomware: The New Threat Using Webcams as Entry Points
Akira represents one of the most recent ransomware threats capable of bypassing traditional organizational defense mechanisms. A recent case analyzed by the S-RM team highlighted

The Evil Purr – DarkLab Interview to HellCat Ransomware!
RHC Dark Lab - March 30th, 2025
HellCat ransomware appeared in the second half of 2024 with and it has attracted the attentions of analysts thanks to the humor within their public statements. We recall the attack...

VanHelsing RaaS: An Expanding Ransomware-as-a-Service Model
Pietro Melillo - March 22nd, 2025
The ransomware threat landscape is constantly evolving, with increasingly structured groups adopting sophisticated strategies to maximize profits. VanHelsing is a new player positioning itself in the Ransomware-as-a-Service (RaaS) market, a...

NIST selects second PQC Key Encapsulation algorithm
Tara Lie - March 18th, 2025
The fourth round of the American National Institute of Standards and Technology (NIST) Post Quantum Cryptography (PQC) competition has selected HQC as a secondary quantum-resilient key encapsulation mechanism (KEM) to...

Paragon Spyware – Let’s talk about privacy and governments
Alessio Stefan - March 18th, 2025
Politics, information technology, and privacy. A triad continually seeking balance with a history of conflict that originates from the introduction of personal computers at the consumer level. Attempts by the...
Sign up for the newsletter