Red Hot Cyber. The Cybersecurity Blog

Scam Alert: How I Almost Fell for a Million-Dollar
My name is Elena and I am a 35-year-old housewife. One day, while I was checking my email, I found a mail that caught my attention. The sender introduced himself as Jean-Pierre, a 60-year-old Italian-French man, terminally ill with cancer.

The First Message Sent in the History of the Internet
Original Publication Date: Massimiliano Brolli, 25 September 2021 Today, exchanging a message through WhatsApp or Skype is a normal gesture, part of the activities we carry out in our daily lives. In all the history books, it is reported that

HijackLoader Expands Techniques to Improve Defense Evasion
Donato Onofri e Emanuele Calvelli Endpoint Security & XDR CrowdStrike. CrowdStrike researchers have identified a HijackLoader (aka IDAT Loader) sample that employs sophisticated evasion techniques to enhance the complexity of the threat. HijackLoader, an increasingly popular tool among adversaries for deploying additional

The Deception of the Wallet: A Journey into the World of Scammers
Giorgio sat in the self-help circle, the dim candlelight dancing on the walls. The eyes of the other participants were fixed on him, waiting for him to speak. It was time to share his story, to unburden himself from the

Ghost Exodus: the story of a hacker in a documentary that has a lot to teach
Ghost Exodus through the exclusive documentary “How Hacking Ruined My Life: Ghost Exodus Story” produced by Silva Rindzevi and visible on the CyberNews Youtube channel, broke the silence to tell us the long road traveled and the consequences of what

Signal towards the Future: Post Quantum Cryptography now protects our messages
Translator: Tara Lie Signal has announced that it has improved encryption within its messenger application. Its end-to-end communication protocol now uses quantum-resistant cryptographic keys, making it resistant to future attacks by quantum computers. Quantum computers – that at the moment

PoC Released for SQL Injection Without Authentication on WordPress WZone Plugin
Pietro Melillo - July 19th, 2024
A proof of concept (PoC) for a critical vulnerability identified as CVE-2024-33544 has recently been released. This vulnerability involves an unauthenticated SQL injection, which poses a serious threat to the...

Threat Actor IntelBroker Exposes Rapid4Cloud Data on Breach Forums
Pietro Melillo - July 18th, 2024
In the world of cybersecurity, news of data breaches is commonplace. Recently, a new alleged breach has made waves: the moderator of BreachForums, known as IntelBroker, has claimed to have...

Sale of a 0Day RCE Exploit for GLPI HelpDesk
Pietro Melillo - July 18th, 2024
Recently, a user on the Breachforums known as "cisc0" posted an announcement regarding the sale of a 0Day exploit for GLPI HelpDesk. According to the user, this exploit works on...

Play Ransomware Claims Attack on MIPS Technologies
Pietro Melillo - July 18th, 2024
In the last few hours, the Data Leak site of the ransomware gang Play Ransomware has published a new claim: the giant MIPS Technologies (www.mips.com) has been the victim of...
Sign up for the newsletter