Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

Red Hot Cyber. The Cybersecurity Blog

- July 12th, 2025 - (Posted in Cybercrime and Darknet)
Cyber warfare is a form of conflict that takes place at the cyber and digital level. This form of warfare has become increasingly widespread in recent years, thanks to the growing dependence of modern societies on technology and information. In this article, we will explore the nature of cyber warfare,...

Anubi, the EDR for your malware and network security

In the current modern context where a cyber war is in progress, the concept of cybersecurity awareness and perimeter fortification is increasingly necessary. In this situation, target objectives are spread through all people who can access the network using a

PRAISE TO VX-UNDERGROUND – The hack-library turns 5!

Every nerd or technology enthusiasts cannot deny the influence of the 1980s on modern computer science. Commodore Amiga, Nintendo, Apple II, now computers are affordable to everyone who could finally benefits of this outstanding innovation. During this years what actually

ClamAV

ClamAV and signatures generation

Threat intelligence has many fields of application, starting from control of infrastructures using automation processes to security increasing the perimeter of applications and solutions in general. One of the most common applications of this concept is antimalware tools, which enterprise

Loki, starting IOC discovering

Today is always more important and significant to be efficient in controlling our own infrastructures; actions to put in place for this verification process shall require both proactive and post-action approach: the last aspect is fundamental when an attack or

The dark side of the Windows Command Prompt: how malicious commands can replace legitimate ones

- July 25th, 2024

If you choose to read this article, please note that it will not discuss a vulnerability or a bug, but rather an intended behavior of Windows Command Prompt which, in...

  

RHC interviews RADAR and DISPOSSESSOR: “When it comes to security, the best defense is a good offense.”

- July 25th, 2024

In our usual underground analysis activities, we came into contact with the cyber gang DISPOSSESSOR, which came to attention in February 2024 in the cyber threat landscape. Accessing their Data...

  

IntelBroker Strikes Again: Unauthorized Access to Two Major American Companies Up for Sale

- July 24th, 2024

IntelBroker strikes again, announcing the sale of unauthorized access to two major American companies, each with revenues reaching hundreds of billions. This announcement was made public through a post on...

  

Exposed the Data of 3,379 Spanish Doctors! When Fraud Becomes “On-Target”

- July 24th, 2024

Recently, a threat actor in an underground forum called Breach Forums published an alleged data breach. The post claims to have exposed the names, departments, and emails of 3,379 Spanish...

  

Sign up for the newsletter