Red Hot Cyber. The Cybersecurity Blog

Intel CPUs Vulnerable! New “Indirector” Attack Threatens Sensitive Data Detection.
Modern Intel processors, including Raptor Lake and Alder Lake CPUs (i.e., 12th and 13th generation Intel “Core” processors), are vulnerable to a new high-precision Branch Target Injection (BTI) attack called “Indirector.” Discovered by security researchers Luyi Li, Hosein Yavarzadeh, and

Threat Actors Release 2022 Electronic Arts (EA) Employee Database
Recently, a threat actor allegedly leaked a database containing information on Electronic Arts (EA) employees from 2022. The data breach was confirmed by the threat actor himself, who explained the reasons behind his decision to make the data public. Currently,

OpenSSH: An RCE run as Root puts 14 million instances on Linux at risk
A recent critical vulnerability in OpenSSH, identified as CVE-2024-6387, could allow unauthenticated remote code execution with root privileges on glibc-based Linux systems. This flaw resides in the server component of OpenSSH (sshd) and is due to a race condition in

Possible Data Breach of the Internal Security Operations Command (ISOC)
A member of BreachForums has announced a significant data breach involving Thailand’s Internal Security Operations Command (ISOC), an agency known as the political arm of the Royal Thai Armed Forces. Currently, we are unable to accurately confirm the veracity of

Bulgarian Hacker “Emil Külev” Arrested
On June 30, 2024, the Sofia police arrested Teodor Iliev, a 21-year-old Bulgarian who called himself “Emil Külev” online. The announcement was made by the Prosecutor’s Office of the Republic of Bulgaria, which stated that they had charged and detained

Cybercriminals exploit ARC popularity to spread Poseidon Malware : Mac users are the target!
In teh last months Mac users have been targeted by a new wave of cyberattack trough malvertising campaigns. The last threat, called “Poseidon” by their creators, has been revealed this 24th June and exploits Google ADV to spread the infostealer.

US Elections and psy-ops: main threats come from Digital Echo Chambers and erosion of trust in democratic processes
Olivia Terragni - October 22nd, 2024
On November 5th, 2024, the next President and Vice President of the United States of America will be elected, as well as 1/3 of the U.S. Senators and all 435...

T-Space Architects Potentially Targeted by Cicada3301 in Data Broker Ransomware Attack
Inva Malaj - October 20th, 2024
London-based architectural firm T-Space Architects may find itself at the center of a significant cyberattack. The ransomware group Cicada3301 has reportedly added T-Space to its growing list of victims, threatening...

Stormous claims an attack on NASA
Pietro Melillo - October 9th, 2024
In recent years, the landscape of cyber threats has been dominated by increasingly sophisticated ransomware groups. Among them, the ransomware group Stormous has gained notoriety for targeting high-profile organizations, including...

The Story Of Conti Ransomware – Origins and Evolution of the RaaS Model (Episode 1)
Alessio Stefan - September 30th, 2024
Ransomware, a malware designed to encrypt data making them restorable only with the use of a private key. Relatively simple math is all that threat actors out there needs to...
Sign up for the newsletter