Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

Red Hot Cyber. The Cybersecurity Blog

- June 27th, 2025 - (Posted in Cybercrime and Darknet)
An unusual example of malicious code has been discovered in a real computing environment, which for the first time recorded an attempt to attack not classical defense mechanisms, but directly artificial intelligence systems. We are talking about the prompt injection technique, i.e. the introduction of hidden instructions capable of compromising...

Possible Data Breach of the Internal Security Operations Command (ISOC)

- July 1st, 2024

A member of BreachForums has announced a significant data breach involving Thailand's Internal Security Operations Command (ISOC), an agency known as the political arm of the Royal Thai Armed Forces....

  

Bulgarian Hacker “Emil Külev” Arrested

- July 1st, 2024

On June 30, 2024, the Sofia police arrested Teodor Iliev, a 21-year-old Bulgarian who called himself "Emil Külev" online. The announcement was made by the Prosecutor's Office of the Republic...

  

Cybercriminals exploit ARC popularity to spread Poseidon Malware : Mac users are the target!

- July 1st, 2024

In teh last months Mac users have been targeted by a new wave of cyberattack trough malvertising campaigns. The last threat, called “Poseidon” by their creators, has been revealed this...

  

Possible Data Breach Affecting TÜV Rheinland AG

- July 1st, 2024

Recently, TÜV Rheinland AG, one of the leading global certification and inspection companies, has appeared on the data leak site of the ransomware group RansomEXX. At present, there are no...

  

Sign up for the newsletter