Red Hot Cyber. The Cybersecurity Blog

Alleged Data Breach of the United States Department of Defense and National Security Agency
Recently, alarming news has emerged on a well-known underground forum regarding alleged data breaches of the United States Department of Defense and the National Security Agency (NSA). The announcements, posted by the user “Gostingr,” have raised concerns among users and

New Ransomware Group “Vanir Group”: Three Victims Immediately in Their Data Leak Site
A new ransomware group, calling themselves “Vanir Group,” has recently made its debut in the cybercrime landscape. This group has quickly garnered attention for the aggressiveness and professionalism of their operations, hitting three victims in a short time and making

Meow ransomware claims attack in its Data Leak Site at HPE giant
Introduction Today, the ransomware gang known as Meow has claimed responsibility for a cyberattack on the multinational giant Hewlett Packard Enterprise (HPE). The claim was published on their Data Leak Site (DLS), where the group offered access to an alleged

The Threat Actor 888 claimed a compromise against Microsoft
On July 9, 2024, a user known as “888” posted on BreachForums claiming to have leaked sensitive data of Microsoft employees. This alleged breach has exposed personal information of 2,073 company employees, reportedly due to a flaw in a third-party

The Threat Actor 888 claims responsibility for a breach at Nokia.
A malicious actor, known by the alias “888,” recently claimed responsibility for disclosing sensitive data belonging to Nokia. The attack, which occurred in July 2024, compromised a wide range of information, raising significant concerns about data security and the protection

Citrix Netscaler ADC and Gateway plagued by serious DOS and Open Redirect flaw
Two vulnerabilities have been identified in NetScaler ADC and NetScaler Gateway. Affected Versions: The following supported versions of NetScaler ADC and NetScaler Gateway are vulnerable: These devices are widely used to enhance application performance and ensure controlled and secure access

The UK’s Digital Crackdown: how the government is using our online habits to breach human rights
Ashleigh Crause - February 12th, 2025
In today's digital age, the boundaries between lawful expression and governmental overreach are becoming increasingly blurred in the United Kingdom. Citizens are finding themselves under scrutiny, and in some cases,...

Ransomware Gangs weaponize Windows Defender Application Control (WDAC) to disable EDR products.
Alex Necula - January 13th, 2025
In the past days we saw that Ransomware Gangs use WDAC to disable EDR products. I have known this type of attack for a year when a guy posts a...

The Story Of Conti Ransomware – The Last Ceremony (Final Episode)
Alessio Stefan - January 8th, 2025
This is the last episode of “The Story Of Conti Ransomware” series, we would finally reach the decline of the group and what this means for the current ransomware landscape....

The Fall of the Human Conscience: Programming Desensitization
Olivia Terragni - January 4th, 2025
Author: Ashleigh Crause Is our Obsessive use of technology making us insensitive? “Technology - Ashleigh Crause tells us - is, by far, one of the most amazing inventions to date”....
Sign up for the newsletter