Red Hot Cyber. The Cybersecurity Blog

The Virginia Department of Elections database may have been hacked and is online on the dark web
A serious security incident appears to have hit the Virginia Department of Elections, causing the unauthorised dissemination of a large election database. The attack, claimed by a user known as IntelBroker, was made public through an online forum dedicated to

Vietnam Hong Ngoc Hospital on Breach Forums: 112,621 Patient and Doctor Profiles Compromised
A serious data breach incident may have recently affected the Hong Ngoc Hospital, a renowned hospital located in Vietnam. The news was disseminated through the BreachForums, a platform known for the buying and selling of compromised data. The volume and

Cambridge University Press & Assessment Ends Up in the DLS of INC Ransomware
In a recent cyberattack, the cybercriminal group known as “INC Ransomware” declared that they had breached the systems of Cambridge University Press & Assessment, employing a double extortion strategy. This tactic, increasingly common among ransomware groups, involves the theft and

Identified a POC for the CVE-2024-34102 Vulnerability in Magento / Adobe Commerce
Recently, a Proof of Concept (POC) for a vulnerability identified as CVE-2024-34102, which affects the Magento and Adobe Commerce e-commerce platforms, has been found online. This vulnerability, detected by security experts from Assetnote, represents a significant threat as it allows

Cyberpunk 2077: Source Code Stolen?
A malicious actor has claimed to have obtained access to the complete source code of Cyberpunk 2077, the famous role-playing game developed by CD Projekt Red. If confirmed, this claim could have devastating consequences for the company and the entire

Natohub claims attack on NATO’s COI. Potential data loss of 362 members
A malicious actor released sensitive data (presumably) belonging to COI Cooperation Portal, a sharing and collaborative environmente for non classified NATO documents. This comprehensive portal is dedicated to supporting NATO organizations, nations, and partners, along with public administrations and industries

RHC interviews Qilin Ransomware! “Let’s play fair and wait for a worthy opponent on the field”
RHC Dark Lab - September 19th, 2024
Qilin (from Chinese :麒麟) is a legendary creature that appears in Chinese mythology and is said to appear with the imminent arrival or demise of a sage or illustrious ruler....

Navigating the future: a dialogue on human resilience and preservation
Alessandro Rugolo - September 5th, 2024
Participants: NewPlato: A contemporary philosopher seeking to understand the nature of human civilization and its future. NewSocrates: A wise mentor exploring the implications of population growth, technological advancements, and the...

Cryptography at Risk: MIT develops a Quantum Algorithm to crack RSA.
Tara Lie - August 27th, 2024
Modern encryption methods, such as RSA, are based on the fact that even the most powerful classical computers are not able to quickly decompose a large number into prime factors....

Interview with Cesare Mencarini. A 17-year-old hacker who created a nuclear reactor in college
Massimiliano Brolli - August 26th, 2024
Today we bring you an interview with Cesare Mencarini, a young man who, at just 17 years old, with uncommon determination and intelligence, built a nuclear fusion reactor as a...
Sign up for the newsletter