Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

Red Hot Cyber. The Cybersecurity Blog

- June 27th, 2025 - (Posted in Cybercrime and Darknet)
An unusual example of malicious code has been discovered in a real computing environment, which for the first time recorded an attempt to attack not classical defense mechanisms, but directly artificial intelligence systems. We are talking about the prompt injection technique, i.e. the introduction of hidden instructions capable of compromising...

New Group Ransomware ‘Pryx’ Compromises 30,000 College Enrollment Data!

- July 3rd, 2024

A new player has emerged on the cybercrime landscape: the ransomware group "Pryx." Pryx has claimed its first significant attack, announcing that it has compromised the systems of Rowan College...

  

Intel CPUs Vulnerable! New “Indirector” Attack Threatens Sensitive Data Detection.

- July 3rd, 2024

Modern Intel processors, including Raptor Lake and Alder Lake CPUs (i.e., 12th and 13th generation Intel "Core" processors), are vulnerable to a new high-precision Branch Target Injection (BTI) attack called...

  

Threat Actors Release 2022 Electronic Arts (EA) Employee Database

- July 2nd, 2024

Recently, a threat actor allegedly leaked a database containing information on Electronic Arts (EA) employees from 2022. The data breach was confirmed by the threat actor himself, who explained the...

  

OpenSSH: An RCE run as Root puts 14 million instances on Linux at risk

- July 2nd, 2024

A recent critical vulnerability in OpenSSH, identified as CVE-2024-6387, could allow unauthenticated remote code execution with root privileges on glibc-based Linux systems. This flaw resides in the server component of...

  

Sign up for the newsletter