Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

Red Hot Cyber. The Cybersecurity Blog

- July 12th, 2025 - (Posted in Cybercrime and Darknet)
Cyber warfare is a form of conflict that takes place at the cyber and digital level. This form of warfare has become increasingly widespread in recent years, thanks to the growing dependence of modern societies on technology and information. In this article, we will explore the nature of cyber warfare,...

Threat Actors Release 2022 Electronic Arts (EA) Employee Database

Recently, a threat actor allegedly leaked a database containing information on Electronic Arts (EA) employees from 2022. The data breach was confirmed by the threat actor himself, who explained the reasons behind his decision to make the data public. Currently,

OpenSSH: An RCE run as Root puts 14 million instances on Linux at risk

A recent critical vulnerability in OpenSSH, identified as CVE-2024-6387, could allow unauthenticated remote code execution with root privileges on glibc-based Linux systems. This flaw resides in the server component of OpenSSH (sshd) and is due to a race condition in

Bulgarian Hacker “Emil Külev” Arrested

On June 30, 2024, the Sofia police arrested Teodor Iliev, a 21-year-old Bulgarian who called himself “Emil Külev” online. The announcement was made by the Prosecutor’s Office of the Republic of Bulgaria, which stated that they had charged and detained

elezioni USA psy ops

US Elections and psy-ops: main threats come from Digital Echo Chambers and erosion of trust in democratic processes

- October 22nd, 2024

On November 5th, 2024, the next President and Vice President of the United States of America will be elected, as well as 1/3 of the U.S. Senators and all 435...

  

T-Space Architects Potentially Targeted by Cicada3301 in Data Broker Ransomware Attack  

- October 20th, 2024

 London-based architectural firm T-Space Architects may find itself at the center of a significant cyberattack. The ransomware group Cicada3301 has reportedly added T-Space to its growing list of victims, threatening...

  

Stormous claims an attack on NASA

- October 9th, 2024

In recent years, the landscape of cyber threats has been dominated by increasingly sophisticated ransomware groups. Among them, the ransomware group Stormous has gained notoriety for targeting high-profile organizations, including...

  

The Story Of Conti Ransomware – Origins and Evolution of the RaaS Model (Episode 1)

- September 30th, 2024

Ransomware, a malware designed to encrypt data making them restorable only with the use of a private key. Relatively simple math is all that threat actors out there needs to...

  

Sign up for the newsletter