Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

Red Hot Cyber. The Cybersecurity Blog

- July 12th, 2025 - (Posted in Cybercrime and Darknet)
Cyber warfare is a form of conflict that takes place at the cyber and digital level. This form of warfare has become increasingly widespread in recent years, thanks to the growing dependence of modern societies on technology and information. In this article, we will explore the nature of cyber warfare,...

Meow ransomware claims attack in its Data Leak Site at HPE giant

Introduction Today, the ransomware gang known as Meow has claimed responsibility for a cyberattack on the multinational giant Hewlett Packard Enterprise (HPE). The claim was published on their Data Leak Site (DLS), where the group offered access to an alleged

The Threat Actor 888 claimed a compromise against Microsoft

On July 9, 2024, a user known as “888” posted on BreachForums claiming to have leaked sensitive data of Microsoft employees. This alleged breach has exposed personal information of 2,073 company employees, reportedly due to a flaw in a third-party

The Threat Actor 888 claims responsibility for a breach at Nokia.

A malicious actor, known by the alias “888,” recently claimed responsibility for disclosing sensitive data belonging to Nokia. The attack, which occurred in July 2024, compromised a wide range of information, raising significant concerns about data security and the protection

UK digital Crackdown

The UK’s Digital Crackdown: how the government is using our online habits to breach human rights


- February 12th, 2025

In today's digital age, the boundaries between lawful expression and governmental overreach are becoming increasingly blurred in the United Kingdom. Citizens are finding themselves under scrutiny, and in some cases,...

  

Ransomware Gangs weaponize Windows Defender Application Control (WDAC) to disable EDR products.

- January 13th, 2025

In the past days we saw that Ransomware Gangs use WDAC to disable EDR products. I have known this type of attack for a year when a guy posts a...

  

The Story Of Conti Ransomware – The Last Ceremony (Final Episode)

- January 8th, 2025

This is the last episode of “The Story Of Conti Ransomware” series, we would finally reach the decline of the group and what this means for the current ransomware landscape....

  

The Fall of the Human Conscience

The Fall of the Human Conscience: Programming Desensitization

- January 4th, 2025

Author: Ashleigh Crause Is our Obsessive use of technology making us insensitive? “Technology - Ashleigh Crause tells us - is, by far, one of the most amazing inventions to date”....

  

Sign up for the newsletter