Red Hot Cyber. The Cybersecurity Blog

Cybercriminals exploit ARC popularity to spread Poseidon Malware : Mac users are the target!
In teh last months Mac users have been targeted by a new wave of cyberattack trough malvertising campaigns. The last threat, called “Poseidon” by their creators, has been revealed this 24th June and exploits Google ADV to spread the infostealer.

Possible Data Breach Affecting TÜV Rheinland AG
Recently, TÜV Rheinland AG, one of the leading global certification and inspection companies, has appeared on the data leak site of the ransomware group RansomEXX. At present, there are no official confirmations from the organization regarding the veracity of the

Juniper Networks Releases Security Updates for a Critical 10.0 Vulnerability
Juniper Networks has recently announced the release of out-of-band security updates to address a severe vulnerability that could lead to an authentication bypass in some of its routers. This vulnerability, identified as CVE-2024-2973, has received a CVSS score of 10.0,

Allegedly Data Breach: Kemenkumham Email Credentials Compromised
A significant data breach has involved the Ministry of Law and Human Rights (Kemenkumham) in Indonesia. According to a post on a hacker forum, a threat actor under the pseudonym “Guzmanloeraxxx” has allegedly leaked the email login credentials of Kemenkumham

Coinbase USA: Threat Actor Claims to Sell Database of 600,000 Users
In the past few hours, a new and alarming cyber threat has emerged. A threat actor has claimed to possess and intends to sell a database containing information on 600,000 US users of the Coinbase platform. This news raises serious

A Brief History of Artificial Intelligence: From Alan Turing to Generative AI
Artificial Intelligence (AI) is in the Spotlight Today, Generating Unprecedented Interest and Debate. However, it’s important to recognize that this revolutionary technology has a rich history spanning over seventy years of continuous development. To fully appreciate the capabilities and potential

The Story Of Conti Ransomware – Origins and Evolution of the RaaS Model (Episode 1)
Alessio Stefan - September 30th, 2024
Ransomware, a malware designed to encrypt data making them restorable only with the use of a private key. Relatively simple math is all that threat actors out there needs to...

RHC Interviews Lynx Ransomware. The cyber-gang offering Pentest services ensuring privacy
RHC Dark Lab - September 23rd, 2024
In July 2024, the Lynx group burst into the RaaS world, which from the outset demonstrated above-average aggressiveness and success in attacks with a total of 22 victims featured on...

Alleged SpaceX Database Breach Published on BreachForums
Pietro Melillo - September 21st, 2024
A recent post on a dark web forum has caught the attention of the international cybersecurity community. A user, identified by the nickname l33tfg, claimed to have published a supposed...

WhiteHouse.gov Data Breach: Threat Actors Leak Sensitive Information!
Redazione RHC - September 21st, 2024
Recently, a threat actor on a dark web forum has posted a claim regarding an alleged data breach involving WhiteHouse.gov. The post, made by a user named "l33tfg," asserts that...
Sign up for the newsletter